به جمع مشترکان مگیران بپیوندید!

تنها با پرداخت 70 هزارتومان حق اشتراک سالانه به متن مقالات دسترسی داشته باشید و 100 مقاله را بدون هزینه دیگری دریافت کنید.

برای پرداخت حق اشتراک اگر عضو هستید وارد شوید در غیر این صورت حساب کاربری جدید ایجاد کنید

عضویت

جستجوی مقالات مرتبط با کلیدواژه « wsn » در نشریات گروه « فناوری اطلاعات »

تکرار جستجوی کلیدواژه «wsn» در نشریات گروه «فنی و مهندسی»
  • Victoria Nozick *
    Programmable foundation has experienced the characteristic for directing the instruments in the network. The plotting of uses of the network has begun the potential of the example of SDN that has aided in the enhancement of directing the network. Dossier Planes and Control Planes are deflected from each other as an effect of the maneuvers of the data plane acts as the dossier aiding designs and leaving behind the contained conclusion making to the bureaucracy that is to say concentrated that is dubbed as boss. Construction of Program- Delimited Socializing for professional or personal gain (SDN) in the surroundings of WWW of Belongings (IoT) is the most important challenge. Though it has innumerable benefits, still safety is the big issue engaged of SDN. In this place division, we will present the freedom attacks and challenges confronted engaged of SDN and IoT and again the impromptu design for IoT in the foundation of SDN. Wireless Sensor Network, WSN, efficient system for forest fire detection, efficient detection method for forest fire systems, Wireless Sensor Network for Forest Fire Detection and Decision Making.
    Keywords: Smart city, WSN, Sensor}
  • Samira Torabi *, Lu Fan
    Greenhouse works with exact observing and controlling of different boundaries, to develop quality conscience crops without killing assets. The cabling laid for the sensors, conveyed inside the greenhouse isn't possible. Thus the need for a computerized framework utilizing remote correspondence, what's more, remote detecting is basic. This paper proposes a Wireless Sensor Network (WSN) based implanted framework and manages the execution of ZigBee organization (over IEEE 802.15.4) for remote controlling of the greenhouse boundaries. The nitty gritty data in regards to the foundation of the ZigBee network in star geography as well as in Mesh Topology, inside the greenhouse is shown. It likewise shows the continuous observation of boundaries like temperature, and dampness, as well as the aggregate power utilization of the framework, with the assistance of a PC-based GUI application, created on the Java stage.
    Keywords: Greenhouse, Real-time monitoring, WSN, Embedded system, ZigBee (IEEE 802.15.4), Topology, GUI}
  • Badria Almaz Ali Yousif

    The Wireless Sensors Network (WSN) is these days generally used to fabricate choice emotionally supportive networks to survive numerous issues. One of the most intriguing fields having an expanding need of choice emotionally supportive networks is accuracy farming Precision Agriculture (PA). This paper presents WSN as the most effective way to take care of the rural issues connected with cultivating assets enhancement, dynamic help, and land observing. This approach gives constant data with regards to the terrains and yields that will assist ranchers with making right choices. Utilizing the fundamental standards of Internet and WSN innovation, accuracy farming frameworks considering the IOT innovation is clarified exhaustively particularly on the equipment design, network engineering what’s more programming process control of the accuracy water system framework. The product screens information from the sensors in an input circle which actuates the control gadgets in view of limit esteem. Execution of WSN in PA will enhance the use of water compost and furthermore amplified the yield of the harvests.

    Keywords: Precision agriculture, Accuracy, WSN, Numerous issues, IOT, Accuracy water system framework, Networkengineering, Water compost}
  • شایسته طباطبائی، حسن نصرتی ناهوک

    در این مقاله، به منظور افزایش دقت ردیابی هدف سعی در کاهش انرژی مصرفی حسگرها با یک الگوریتم جدید برای ردیابی هدف توزیع شده بنام الگوریتم جستجوی شکار دارد. روش پیشنهادی با پروتکل DCRRP و پروتکل NODIC مقایسه شده است که برای بررسی عملکرد این الگوریتمها از شبیه سازOPNET ورژن 11.5 استفاده شده است. نتایج شبیه سازی نشان می دهد که الگوریتم پیشنهادی از نظر مصرف انرژی، نرخ تحویل سالم داده و نرخ گذردهی نسبت به دو پروتکل دیگر بهتر عمل می کند.

    کلید واژگان: شبکه حسگر بی سیم, الگوریتم جستجوی شکار, خوشه بندی, ردیابی هدف متحرک, پروتکلDCRRP, پروتکل NODIC}
    Shayesteh Tabatabaei, Hassan Nosrati Nahook

    In this paper, in order to increase the accuracy of target tracking, it tries to reduce the energy consumption of sensors with a new algorithm for tracking distributed targets called hunting search algorithm. The proposed method is compared with the DCRRP protocol and the NODIC protocol, which uses the OPNET simulator version 11.5 to test the performance of these algorithms. The simulation results show that the proposed algorithm performs better than the other two protocols in terms of energy consumption, healthy delivery rate and throughput rate.

    Keywords: wsn, hunting search algorithm, clustering, target tracking, DCRRP Protocol, Nodic protocol}
  • Swathi B H *, Megha V, Gururaj H L, Hamsaveni M, Janhavi V
    Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing attack and Sybil attack. In this paper we considered these attacks and presented a solution to identify the attacks. Many approaches have been proposed to diminish these attacks, but very few methods can detect these attacks effectively. In this simple scheme, every node selects a parent node to forward the packet towards base station or sink. Each node append its unique identity and trust to the parent as a path marker. It encrypts the bytes using a secret key generated and shared among the sink. The encrypted packet is then forwarded to the parent node. Base station can identify the malicious nodes by using these unique identity and trust value.
    Keywords: WSN, Packet modification, Packet Dropping, Packet fake routing, bad mouthing attack}
نکته
  • نتایج بر اساس تاریخ انتشار مرتب شده‌اند.
  • کلیدواژه مورد نظر شما تنها در فیلد کلیدواژگان مقالات جستجو شده‌است. به منظور حذف نتایج غیر مرتبط، جستجو تنها در مقالات مجلاتی انجام شده که با مجله ماخذ هم موضوع هستند.
  • در صورتی که می‌خواهید جستجو را در همه موضوعات و با شرایط دیگر تکرار کنید به صفحه جستجوی پیشرفته مجلات مراجعه کنید.
درخواست پشتیبانی - گزارش اشکال