Journal articles on the topic 'Hybrid node'

To see the other types of publications on this topic, follow the link: Hybrid node.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hybrid node.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.

Full text
Abstract:
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.
APA, Harvard, Vancouver, ISO, and other styles
2

Kaundal, Vivek, Paawan Sharma, and Manish Prateek. "Wireless Sensor Node Localization based on LNSM and Hybrid TLBO- Unilateral technique for Outdoor Location." International Journal of Electronics and Telecommunications 63, no. 4 (November 27, 2017): 389–97. http://dx.doi.org/10.1515/eletel-2017-0054.

Full text
Abstract:
Abstract The paper aims at localization of the anchor node (fixed node) by pursuit nodes (movable node) in outdoor location. Two methods are studied for node localization. The first method is based on LNSM (Log Normal Shadowing Model) technique to localize the anchor node and the second method is based on Hybrid TLBO (Teacher Learning Based Optimization Algorithm)- Unilateral technique. In the first approach the ZigBee protocol has been used to localize the node, which uses RSSI (Received Signal Strength Indicator) values in dBm. LNSM technique is implemented in the self-designed hardware node and localization is studied for Outdoor location. The statistical analysis using RMSE (root mean square error) for outdoor location is done and distance error found to be 35 mtrs. The same outdoor location has been used and statistical analysis is done for localization of nodes using Hybrid TLBO-Unilateral technique. The Hybrid- TLBO Unilateral technique significantly localizes anchor node with distance error of 0.7 mtrs. The RSSI values obtained are normally distributed and standard deviation in RSSI value is observed as 1.01 for outdoor location. The node becomes 100% discoverable after using hybrid TLBO- Unilateral technique.
APA, Harvard, Vancouver, ISO, and other styles
3

P. Saveetha, P. Saveetha, Y. Harold Robinson P. Saveetha, Vimal Shanmuganathan Y. Harold Robinson, Seifedine Kadry Vimal Shanmuganathan, and Yunyoung Nam Seifedine Kadry. "Hybrid Energy-based Secured Clustering technique for Wireless Sensor Networks." 網際網路技術學刊 23, no. 1 (January 2022): 021–31. http://dx.doi.org/10.53106/160792642022012301003.

Full text
Abstract:
<p>The performance of the Wireless sensor networks (WSNs) identified as the efficient energy utilization and enhanced network lifetime. The multi-hop path routing techniques in WSNs have been observed that the applications with the data transmission within the cluster head and the base station, so that the intra-cluster transmission has been involved for improving the quality of service. This paper proposes a novel Hybrid Energy-based Secured Clustering (HESC) technique for providing the data transmission technique for WSNs to produce the solution for the energy and security problem for cluster based data transmission. The proposed technique involves the formation of clusters to perform the organization of sensor nodes with the multi-hop data transmission technique for finding the specific node to deliver the data packets to the cluster head node and the secured transmission technique is used to provide the privacy of the sensor nodes through the cluster. The residual energy of the sensor nodes is another parameter to select the forwarding node. The simulation results can show the efficiency of this proposed technique in spite of lifetime within the huge amount data packets. The security of this proposed technique is measured and increases the performance of the proposed technique.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
4

Hasan, Ola, Abdulmuttalib Rashid, and Ramzy Ali. "Hybrid approach for multi-node localization and Identification." Basrah journal for engineering science 16, no. 2 (June 1, 2016): 11–20. http://dx.doi.org/10.33971/bjes.16.2.2.

Full text
Abstract:
In this paper, a new approach for the positioning(localization) of multi-node systems is presented. Each nodeincluding the beacon node contains two types of sensors: onefor the distance sensing and the other type is forcommunication. The main idea of our proposed approach is touse the control of beacon to construct anodes' tree which isgoing to be used later by the nodes to know the paths in whichthe information will flow. During the tree construction, theidentities of nodes will be known. Every node except thebeacon will use the information obtained from its previousneighbor in the tree to find its own location and orientation.Several simulations using visual basic 2012 are implemented todiscern the performance of this algorithm.
APA, Harvard, Vancouver, ISO, and other styles
5

Masoud, Mohammad Z., Yousef Jaradat, Ismael Jannoud, and Mustafa A. Al Sibahee. "A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771985823. http://dx.doi.org/10.1177/1550147719858231.

Full text
Abstract:
In this work, a new hybrid clustering routing protocol is proposed to prolong network life time through detecting holes and edges nodes. The detection process attempts to generate a connected graph without any isolated nodes or clusters that have no connection with the sink node. To this end, soft clustering/estimation maximization with graph metrics, PageRank, node degree, and local cluster coefficient, has been utilized. Holes and edges detection process is performed by the sink node to reduce energy consumption of wireless sensor network nodes. The clustering process is dynamic among sensor nodes. Hybrid clustering routing protocol–hole detection converts the network into a number of rings to overcome transmission distances. We compared hybrid clustering routing protocol–hole detection with four different protocols. The accuracy of detection reached 98%. Moreover, network life time has prolonged 10%. Finally, hybrid clustering routing protocol–hole detection has eliminated the disconnectivity in the network for more than 80% of network life time.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Hui, and Hang Zhang. "Research on Relay Node Placement Based on Hybrid Greedy Optimization Algorithm in Wireless Sensor Networks." Applied Mechanics and Materials 644-650 (September 2014): 3028–31. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3028.

Full text
Abstract:
In this paper, we propose a hybrid greedy optimization algorithm for (WSN, wireless sensor networks) and then design the relay node layout system. The test results demonstrate that the hybrid algorithm greatly reduces the number of nodes required to avoid wasting too much unnecessary relay node.
APA, Harvard, Vancouver, ISO, and other styles
7

Kang, Min Wook, and Yun Won Chung. "An Improved Hybrid Routing Protocol Combining MANET and DTN." Electronics 9, no. 3 (March 5, 2020): 439. http://dx.doi.org/10.3390/electronics9030439.

Full text
Abstract:
Hybrid protocols combining a mobile ad hoc network (MANET) and a delay tolerant network (DTN) have recently been proposed. In these works, a whole network is fragmented, and MANET is generally used for intra-fragment communication, while DTN is used for inter-fragment communication. In this paper, an improved hybrid routing protocol was proposed, wherein virtual source nodes are selected based on the delivery predictability to the destination node if routing path to the destination node is not successfully established using MANET protocol. Then, messages are delivered to the destination node from the original source node and selected virtual source nodes. Performance evaluation results show that the proposed protocol with appropriate selection of delivery predictability threshold values has a better delivery ratio than conventional protocol, at the expense of overhead ratio in the considered parameter setting.
APA, Harvard, Vancouver, ISO, and other styles
8

Draz, Umar, Muhammad Hasanain Chaudary, Tariq Ali, Abid Sohail, Muhammad Irfan, and Grzegorz Nowakowski. "Trust-Based Beacon Node Localization Algorithm for Underwater Networks by Exploiting Nature Inspired Meta-Heuristic Strategies." Electronics 11, no. 24 (December 11, 2022): 4131. http://dx.doi.org/10.3390/electronics11244131.

Full text
Abstract:
Conventional underwater technologies were not able to provide authentication and proper visualization of unexplored ocean areas to accommodate a wide range of applications. The aforesaid technologies face several challenges including decentralization, beacon node localization (for identification of nodes), authentication of Internet of Underwater Things (IoUTs) objects and unreliable beacon node communication between purpose oriented IoT-enabled networks. Recently, new technologies such as blockchain (BC) and the IoUTs have been used to reduce the issues but there are still some research gaps; for example, unreliable beacon messages for node acquisition have significant impacts on node identification and localization and many constrained node resources, etc. Further, the uncertainty of acoustic communication and the environment itself become problems when designing a trust-based framework for the IoUTs. In this research, a trust-based hybrid BC-enabled beacon node localization (THBNL) framework is proposed to employ a secure strategy for beacon node localization (BNL) to mine the underwater localized nodes via the hybrid blockchain enabled beacon node localization (HB2NL) algorithm. This framework helps to merge two disciplines; it is hybrid because it follows the nature and bio inspired meta heuristics algorithms for scheduling the beacon nodes. The performance of the proposed approach is also evaluated for different factors such as node losses, packet delivery ratios, residual and energy consumption and waiting time analysis, etc. These findings show that the work done so far has been successful in achieving the required goals while remaining within the system parameters.
APA, Harvard, Vancouver, ISO, and other styles
9

OLA, ARJUN LAL. "Evaluation of okra [Abelmoschus esculentus (L.) Moench] hybrids for growth, yield attributes and yield." Annals of Plant and Soil Research 23, no. 4 (November 1, 2021): 437–40. http://dx.doi.org/10.47815/apsr.2021.10098.

Full text
Abstract:
The present experiment was carried out at RLBCAU, Jhansi with okra hybrids during summer season of 2020 to evaluate the performance of okra hybrids for growth and yield. Fourteen okra hybrids were evaluated in randomized block design with three replications. The results revealed that 50 % seed germination was observed in hybrid NS-7772. The highest plant height (133.7cm) was recorded in hybrid Somaya, while, highest number of nodes per plant (27.4) was observed in NOH-05. The minimum length of node (3.27cm) was noticed in SW 001.The maximum number of primary branches per plant (3.73) was noticed in hybrid NOH-1053. On the basis of yield attributes, the maximum pod length (12.4 cm), 10 pod weight (160.7g), yield per plant (461.2g) and yield (17.08 t ha-1) were observed in hybrid NS 7772.
APA, Harvard, Vancouver, ISO, and other styles
10

M. Udhaya Sankar, S., S. Thanga Revathi, and R. Thiagarajan. "Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes." Computer Systems Science and Engineering 45, no. 1 (2023): 625–40. http://dx.doi.org/10.32604/csse.2023.030444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Thanigaivelan, Nanda Kumar, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation." Security and Communication Networks 2018 (August 15, 2018): 1–15. http://dx.doi.org/10.1155/2018/3672698.

Full text
Abstract:
We present a hybrid internal anomaly detection system that shares detection tasks between router and nodes. It allows nodes to react instinctively against the anomaly node by enforcing temporary communication ban on it. Each node monitors its own neighbors and if abnormal behavior is detected, the node blocks the packets of the anomaly node at link layer and reports the incident to its parent node. A novel RPL control message, Distress Propagation Object (DPO), is formulated and used for reporting the anomaly and network activities to the parent node and subsequently to the router. The system has configurable profile settings and is able to learn and differentiate between the nodes normal and suspicious activities without a need for prior knowledge. It has different subsystems and operation phases that are distributed in both the nodes and router, which act on data link and network layers. The system uses network fingerprinting to be aware of changes in network topology and approximate threat locations without any assistance from a positioning subsystem. The developed system was evaluated using test-bed consisting of Zolertia nodes and in-house developed PandaBoard based gateway as well as emulation environment of Cooja. The evaluation revealed that the system has low energy consumption overhead and fast response. The system occupies 3.3 KB of ROM and 0.86 KB of RAM for its operations. Security analysis confirms nodes reaction against abnormal nodes and successful detection of packet flooding, selective forwarding, and clone attacks. The system’s false positive rate evaluation demonstrates that the proposed system exhibited 5% to 10% lower false positive rate compared to simple detection system.
APA, Harvard, Vancouver, ISO, and other styles
12

Haw, Su-Cheng, and Emyliana Song. "Transforming data-centric eXtensible markup language into relational databases using hybrid approach." Bulletin of Electrical Engineering and Informatics 10, no. 6 (December 1, 2021): 3256–64. http://dx.doi.org/10.11591/eei.v10i6.2865.

Full text
Abstract:
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
APA, Harvard, Vancouver, ISO, and other styles
13

SiMa, Y. Z., H. P. Zhu, and Y. Miao. "Dual Reciprocity Singular Hybrid Boundary Node Method for Solving Inhomogeneous Equations." Journal of Mechanics 25, no. 2 (June 2009): 137–42. http://dx.doi.org/10.1017/s1727719100002586.

Full text
Abstract:
AbstractBased on the radial basis function (RBF) and the singular hybrid boundary node method (SHBNM), this paper presents an inherent meshless, boundary-only technique, which names dual reciprocity singular hybrid boundary node method (DRSHBNM), for numerical solution of various inhomogeneous equations. In this study, the RBFs are employed to approximate the inhomogeneous terms via dual reciprocity method (DRM), while the general solution is solved by means of SHBNM, in which only requires discrete nodes constructed on the boundary of a domain, while several nodes in the domain are needed for the RBF interpolation. The treatment of singularity integration and the 'boundary layer effect' have been given by a series of effective approaches. Numerical examples for the solution of inhomogeneous equations show that high convergence rates and high accuracy with a small node number are achievable.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Jianming, Zhenhan Yao, and Hong Li. "A hybrid boundary node method." International Journal for Numerical Methods in Engineering 53, no. 4 (2001): 751–63. http://dx.doi.org/10.1002/nme.313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ganesan, T., and Pothuraju Rajarajeswari. "Hybrid Genetic Algorithm With Haar Wavelet for Maximum Target Coverage Node Deployment in Wireless Sensor Networks." Journal of Cases on Information Technology 23, no. 3 (July 2021): 78–95. http://dx.doi.org/10.4018/jcit.20210701.oa6.

Full text
Abstract:
Wireless sensor networks (WSNs) are used in industrial applications and focused on target coverage and node connectivity based WSNs. The set of sensors and targets is placed in optimal position the target coverage and node connectivity achieving maximum with limited senor nodes. To resolve this problem, the proposed hybrid genetic algorithm combined with lifting wavelet multi-resolution principles for recognizing optimal position for sensors to cover entire targets present in the fields. The hybrid genetic algorithm randomly identifies each sensor position and 2D Haar lifting wavelet transform to improve the quality of target coverage by adjusting node position. The 2D Haar lifting decomposes the population matrix into the optimal position of sensors. Experimental results show the performance of the proposed hybrid genetic algorithm and fast local search method compared with available algorithms improves the target coverage and the number of nodes with varying and fixed sensing ranges with a different region.
APA, Harvard, Vancouver, ISO, and other styles
16

Qi, Rongbin, Sijin Li, Tianyi Ma, and Feng Qian. "Localization with a Mobile Anchor Using ABC-GA Hybrid Algorithm in Wireless Sensor Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 16, no. 6 (September 20, 2012): 741–47. http://dx.doi.org/10.20965/jaciii.2012.p0741.

Full text
Abstract:
Nodes localization plays an important role in applications of wireless sensor networks. In this paper, a localization scheme with a mobile anchor using a hybrid algorithm (ABC-GA) which combines Artificial Bee Colony (ABC) algorithm with the advantages of Genetic Algorithm (GA) is proposed. The localization scheme determines location of unknown node by the mobile anchor. It has high accuracy without any additional requirements for the hardware of unknown node. The core problem of the scheme is to find the shortest path to traverse all unknown nodes by the proposed hybrid algorithm. Simulation results show that ABC-GA hybrid algorithm has high convergence rate and strong global search capability, and the accuracy of localization scheme is satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Ze, Chang Zhou, and Yiran Liu. "Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/8636379.

Full text
Abstract:
The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.
APA, Harvard, Vancouver, ISO, and other styles
18

Kalwaghe, Samidha N., and Atul Vasudev Dusane. "Hole Detection and Healing in Hybrid Wireless Sensor Network." APTIKOM Journal on Computer Science and Information Technologies 1, no. 2 (June 16, 2016): 41–45. http://dx.doi.org/10.34306/csit.v1i2.43.

Full text
Abstract:
The emerging technology of wireless sensor network (WSN) is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring, smart spaces and so on. The coverage problem is a fundamental issue in WSN, which may cause due to low residual energy of nodes or poor installment. But in order to get full coverage of sensing area Coverage problem must be avoided. If the problem is unavoidable the coverage hole must be healed. Current hole healing algorithms uses complicated hole detection strategies like TENT rule. This project seeks to address the problem of hole detection and healing in mobile WSNs by deploying mobile sensors in the network, which is called hybrid sensor network. An enhanced hole detection and healing method (MHEAL) is proposed. MHEAL is a distributed and localized algorithm that operates in two distinct phases. First, is Distributed Hole Detection (DHD) proposed to identify the boundary nodes and discover holes. Second, is hole healing which uses a virtual forces based hole healing approach where only the nodes located at an appropriate distance from the hole and the nodes having maximum energy will be involved in the healing process. Unlike existing algorithms, proposed algorithm uses QURD based node detection and energy efficient Hole healing and thus solves the problem of hole with 100% coverage, minimum node movements and minimum node distance travelled thus giving a cost efficient solution.
APA, Harvard, Vancouver, ISO, and other styles
19

Kalwaghe, Samidha N., and Atul V. Dusane. "Hole Detection and Healing in Hybrid Wireless Sensor Network." APTIKOM Journal on Computer Science and Information Technologies 1, no. 2 (July 1, 2016): 41–45. http://dx.doi.org/10.11591/aptikom.j.csit.105.

Full text
Abstract:
The emerging technology of wireless sensor network (WSN) is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring, smart spaces and so on. The coverage problem is a fundamental issue in WSN, which may cause due to low residual energy of nodes or poor installment. But in order to get full coverage of sensing area Coverage problem must be avoided. If the problem is unavoidable the coverage hole must be healed. Current hole healing algorithms uses complicated hole detection strategies like TENT rule. This project seeks to address the problem of hole detection and healing in mobile WSNs by deploying mobile sensors in the network, which is called hybrid sensor network. An enhanced hole detection and healing method (MHEAL) is proposed. MHEAL is a distributed and localized algorithm that operates in two distinct phases. First, is Distributed Hole Detection (DHD) proposed to identify the boundary nodes and discover holes. Second, is hole healing which uses a virtual forces based hole healing approach where only the nodes located at an appropriate distance from the hole and the nodes having maximum energy will be involved in the healing process. Unlike existing algorithms, proposed algorithm uses QURD based node detection and energy efficient Hole healing and thus solves the problem of hole with 100% coverage, minimum node movements and minimum node distance travelled thus giving a cost efficient solution.
APA, Harvard, Vancouver, ISO, and other styles
20

Azeez Asmael, Ahmed Abdul, and Basman Al-Nedawe. "Energy efficient WSN using hybrid modification PEGASIS with ant lion optimization." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (July 1, 2021): 273. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp273-284.

Full text
Abstract:
<p>Wireless sensor nodes consist of tiny electronic devices that can sense, transmit, and measure data from physical environments such as the field of minter surveillance. These sensor nodes significantly depend on batteries to gain energy which is used to operations associated with communication and computation. Generally, designing communication protocols is feasible to achieve effective usage of these energy resources of the sensor node. Both reported medium access control and routing can achieve energy-saving that supporting real time functionality. This paper emphasizes the use of hybrid modified PEGASIS-Ant lion optimization. Several steps are entailed in this research. First is random distribution of node followed by clustering the map as a circular region. Then, the nodes are connected to the closest node in that region. In consequence, PEGASIS-Ant lion optimization is applied to enhance the connection of the nodes and accomplish the maximum life batter of the sensor. At last, the experiments performed in this work demonstrate that the proposed optimization technique operates well in terms of network latency, power duration and energy’s consumption. Furthermore, the life span of the nodes has improved greatly by 87% over the original algorithm that accomplished a rate of life nodes of 60%.</p>
APA, Harvard, Vancouver, ISO, and other styles
21

Jog, C. S. "A 27-node hybrid brick and a 21-node hybrid wedge element for structural analysis." Finite Elements in Analysis and Design 41, no. 11-12 (June 2005): 1209–32. http://dx.doi.org/10.1016/j.finel.2004.11.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Fei Fei, Hua Rui Wu, Ling Yuan, Yi Sheng Miao, and Li Zhu. "A Farmland Wireless Sensor Network Optimization Topology Control Algorithm." Applied Mechanics and Materials 441 (December 2013): 1005–9. http://dx.doi.org/10.4028/www.scientific.net/amm.441.1005.

Full text
Abstract:
Different node layout density exist in farmland wireless sensor network monitoring, but the existing wireless sensor network topology control algorithm does not take uneven node distribution into consideration. And the node residual energy issue is not considered in the commonly used LMST topology control algorithm either. This paper presents a wireless sensor network hybrid topology control algorithm which considered both the uneven distribution of network nodes and the residual energy issue. Firstly, this algorithm clustering in the high node density areas based on node degree to reduce overall energy consumption. Secondly this algorithm use nodes residual energy based LMST topology control algorithm to achieve energy balance among network nodes. This improved algorithm ultimately achieved the purpose of prolonging the network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
23

Hung, Chung-Wen, Hao-Jun Zhang, Wen-Ting Hsu, and Yi-Da Zhuang. "A Low-Power WSN Protocol with ADR and TP Hybrid Control." Sensors 20, no. 20 (October 12, 2020): 5767. http://dx.doi.org/10.3390/s20205767.

Full text
Abstract:
Most Internet of Things (IoT) systems are based on the wireless sensor network (WSN) due to the reduction of the cable layout cost. However, the battery life of nodes is a key issue when the node is powered by a battery. A Low-Power WSN Protocol with ADR and TP Hybrid Control is proposed in this paper to improve battery life significantly. Besides, techniques including the Sub-1GHz star topology network with Time Division Multiple Access (TDMA), adaptive data rate (ADR), and transmission power control (TPC) are also used. The long-term testing results show that the nodes with the proposed algorithm can balance the communication quality and low power consumption simultaneously. The experimental results also show that the power consumption of the node with the algorithm was reduced by 38.46-54.44% compared with the control group. If using AAA battery with 1200 mAh, the node could run approximately 4.2 years with the proposed hybrid control algorithm with an acquisition period of under 5 s.
APA, Harvard, Vancouver, ISO, and other styles
24

Husam Mahdi, Miaad, and Ibrahim Adel Ibrahim. "Routing protocols for hybrid wireless networks: a brief review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (August 1, 2022): 842. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp842-848.

Full text
Abstract:
Hybrid <span>wireless networks (HWNs) are resulted from the integration of a mobile Ad hoc networks (MANET) and an infrastructure wireless networks. These networks have received increasing interest from researchers for their superior performance and reliability. Packet routing protocols in hybrid wireless networks are important to increase the capacity and scalability of these networks, therefore, several routing protocols have been proposed. Routing protocols in HWNs are designed and implemented from combining <span>the cellular transmission mode with the Ad hoc transmission mode. To route a message to the intended recipient of the sender, hybrid wireless networks use multi-hop technology. However, the source node needs relay nodes, which may be either adjacent nodes or base stations depending on set of parameters like bandwidth, load balancing, or the nearest node. This paper explores routing protocols for hybrid wireless networks and the techniques to enhance the security, performance, and capacity of these routing protocols.</span></span>
APA, Harvard, Vancouver, ISO, and other styles
25

Jawahar, A., S. Radha, and S. Vadivelan. "Connectivity-Guaranteed Hybrid Topology Management Scheme for Improving the Operational Lifetime of 3-Dimensional Wireless Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 547368. http://dx.doi.org/10.1155/2010/547368.

Full text
Abstract:
The battery of limited energy operates wireless sensor nodes, it is important to increase the lifetime of the wireless sensor network. The aim of our work is to design a hybrid topology management scheme for improving the lifetime of the wireless sensor networks with guaranteed connectivity. The sensing range of the sensor node is smaller than the radio range and hence there is a large number of nodes within the coverage area of a node. Hence the network connectivity can be maintained with less number of nodes. By using this fact, we can save energy by switching off the transceiver, which consumes most of the energy. On the other hand, the sensor node spends most of the time in monitoring state and the transceiver is idle. In the idle state the transceiver consumes almost the same energy as in receiving state. Hence putting the transceiver in the sleep mode when it is idle can save the significant energy. We have designed a hybrid topology management scheme for 3-Dimensional sensor networks by making use of these facts. Our hybrid scheme improves the lifetime of the 3-Dimensional sensor network by a factor of 19.
APA, Harvard, Vancouver, ISO, and other styles
26

Voronchikhin, V. V., I. N. Voronchikhina, V. S. Rubets, and V. V. Pylnev. "Influence of subterraneous plant organs on yields and winter hardness of winter triticale (× Triticosecale Wittm.)." IOP Conference Series: Earth and Environmental Science 1045, no. 1 (June 1, 2022): 012050. http://dx.doi.org/10.1088/1755-1315/1045/1/012050.

Full text
Abstract:
Abstract Purpose of this work was to identify the influence of the underground part of the plant on winter hardness and crop yields of collection of winter hexaploid triticale with different eco-geographical origin in the terms of Nonchernozem zone in Russia. The set of 43 hybrids of triticale with different eco-geographical origin was divided into 5 groups according to its origin: Dagestan, North Caucasus, Central Black Earth zone and Ukraine, Nonchernozem zone of Russia, Belarus and Eastern Europe. For every hybrid in a group, the number of plants with lower tillering node, availability and degree of epicotyl development and secondary root system calculated and the correlation analysis of these traits with grain yields performed. The grain yields considered as an integral indicator of the genotype adaptability for specific environment conditions. As a result, the triticale genotypes with stable development of a large number of plants with lower tillering node selected Mikola, Antey, Valentin, AD4, Timbo, AD 44 and Flamingo. The influence of environment conditions where the triticale hybrid created on selection of high yields genotype and increased number of plants with lower tillering node revealed. Greatest conjugacy between crop yields and availability of double tillering nodes is typical for hybrids from Central part of country and Belarus. It turned out that hybrids from southern regions have a positive relation of crop yields and the length of epicotyl. The hybrids from Central part of Russia, Belarus and Europe do not have this correlation. A weak positive relation in triticale hybrids found between development of secondary root system and grain yield.
APA, Harvard, Vancouver, ISO, and other styles
27

Mohindru, Vandana, Yashwant Singh, and Ravindara Bhatt. "Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, no. 2 (April 27, 2020): 251–59. http://dx.doi.org/10.2174/2352096512666190215125026.

Full text
Abstract:
Background: Security in WSNs is the most significant because sensor nodes deployed are in an unattended environment, and the information is communicated over insecure wireless channels. Therefore, there is a need to put enhanced security measures for securing sensor nodes as well as ensure secured transmission of information. Objective: These resource-constrained networks suffer from various attacks namely, node clone attack, Sybil attack, and DoS attack. In this paper, we proposed a hybrid cryptography algorithm, which secured WSNs from node clone attack. Methods: The proposed algorithm uses a combination of symmetric (AES) and asymmetric (ECC) cryptography techniques along with the hash function. Further, the proposed algorithm checks the integrity of messages during communication in the sensor network. Results: The performance of the proposed hybrid algorithm was examined through the various metrics like communication, computation, and storage overheads. The comparison of the results validates the efficiency of the proposed hybrid algorithm. Conclusion: The proposed hybrid algorithm provides a secure and efficient solution to the energy sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Lu, Biao, and Wansu Liu. "Nonuniform Clustering of Wireless Sensor Network Node Positioning Anomaly Detection and Calibration." Journal of Sensors 2021 (October 16, 2021): 1–10. http://dx.doi.org/10.1155/2021/5733308.

Full text
Abstract:
In order to detect and correct node localization anomalies in wireless sensor networks, a hierarchical nonuniform clustering algorithm is proposed. This paper designs a centroid iterative maximum likelihood estimation location algorithm based on nonuniformity analysis, selects the nonuniformity analysis algorithm, gives the flowchart of node location algorithm, and simulates the distribution of nodes with MATLAB. Firstly, the algorithm divides the nodes in the network into different network levels according to the number of hops required to reach the sink node. According to the average residual energy of nodes in each layer, the sink node selects the nodes with higher residual energy in each layer of the network as candidate cluster heads and selects a certain number of nodes with lower residual energy as additional candidate cluster heads. Then, at each level, the candidate cluster heads are elected to produce the final cluster heads. Finally, by controlling the communication range between cluster head and cluster members, clusters of different sizes are formed, and clusters at the level closer to the sink node have a smaller scale. By simulating the improved centroid iterative algorithm, the values of the optimal iteration parameters α and η are obtained. Based on the analysis of the positioning errors of the improved centroid iterative algorithm and the maximum likelihood estimation algorithm, the value of the algorithm conversion factor is selected. Aiming at the problem of abnormal nodes that may occur in the process of ranging, a hybrid node location algorithm is further proposed. The algorithm uses the ℓ 2 , 1 norm to smooth the structured anomalies in the ranging information and realizes accurate positioning while detecting node anomalies. Experimental results show that the algorithm can accurately determine the uniformity of distribution, achieve good positioning effect in complex environment, and detect abnormal nodes well. In this paper, the hybrid node location algorithm is extended to the node location problem in large-scale scenes, and a good location effect is achieved.
APA, Harvard, Vancouver, ISO, and other styles
29

Cao, Yuyan, Yongxi Lyu, and Xinmin Wang. "Fault Diagnosis Reasoning Algorithm for Electromechanical Actuator Based on an Improved Hybrid TFPG Model." Electronics 9, no. 12 (December 16, 2020): 2153. http://dx.doi.org/10.3390/electronics9122153.

Full text
Abstract:
As a new generation of power-by-wire actuators, electromechanical actuators are finding increasingly more applications in the aviation field. Aiming at the application problem of the fault diagnosis of the electromechanical actuator, an improved diagnosis reasoning algorithm based on a hybrid timed failure propagation graph (TFPG) model is proposed. On the basis of this hybrid TFPG model, the activation conditions of OR and causality among nodes are given. The relationship discrepancy node is transformed into a relationship node and discrepancy node, which unifies the model storage process. The backward and forward extension operations of hypothesis generation and updating are improved. In the backward expansion operation, the specific process of backward update from non-alarm nodes is given, and the judging logic of the branch of relationship nodes is added, which guarantees the unity of the algorithm framework and the accuracy of the time update. In the forward expansion operation, the update order is adjusted to ensure the accuracy of the node update for the case of multiple parents. A hybrid TFPG model of the electromechanical actuator is established in the general modeling environment (GME), and a systematic verification scheme with two simulation types is tested with the application of the P2020 reference design board (RDB) and VxWorks 653 system. The results show that the proposed algorithm can realize the fault diagnosis of the electromechanical actuator as well as fault propagation prediction.
APA, Harvard, Vancouver, ISO, and other styles
30

Yu, Ji Ming, Xiao Yong Yan, Nan Xu, and Yu Wang Yang. "Collision-Avoiding Aware Routing Based on Real-Time Hybrid Traffic Infomations." Advanced Materials Research 396-398 (November 2011): 2511–14. http://dx.doi.org/10.4028/www.scientific.net/amr.396-398.2511.

Full text
Abstract:
Vehicular Ad Hoc Networks (VANET) is a peculiar type of mobile Ad Hoc networks for ITS,compared with MANET, it has following distinguishing feature: high dynamic topology changing, speed-moving nodes, frequently disconnected network, unlimited battery power and storage, network node movement restraind by traffic rule. The article definition the concept collision-set,and derive a novel collision-avoiding aware routing based on real-time hybrid-traffic infomations which restricted by traffic rule(RHCAR). Nodes will builting subnetworks based on collision-set, every node will communicate with its neighbours of collision-set for collision-avoiding,extensive simulations the collision-avoiding trend with two type of scenario.
APA, Harvard, Vancouver, ISO, and other styles
31

Park, Jung, Jeeyoung Kim, and Soon Kang. "A Situation-Aware Indoor Localization (SAIL) System Using a LF and RF Hybrid Approach." Sensors 18, no. 11 (November 10, 2018): 3864. http://dx.doi.org/10.3390/s18113864.

Full text
Abstract:
Recently, studies focusing on identifying user’s current location for use in a wide variety of differentiated location-based and localization services have steadily increased. In particular, location awareness using wireless communication is gaining attention in indoor environments composed of many obstacles, where GPS signals cannot reach. Previously, studies have focused mostly on location precision, which resulted in using many beacon nodes, not considering the initial installation and maintenance costs, communication robustness, or power consumption. This makes it difficult to apply existing methods to various fields, especially in mobile nodes (i.e., wearable devices, mobile tags, etc.) with limited battery capacity. In this paper, we propose a hybrid situation-aware indoor localization (SAIL) system for real-time indoor localization using a combination of low frequency (LF) and Bluetooth Low Energy (BLE) 4.0. This approach allows us to work with limited battery capacity mobile devices, and identify tagged mobile nodes and their current location in relevance to the anchor node. In our experiment, we attached one anchor node at the entrance to indoor areas such as office or factory settings. Using our hybrid SAIL system, we were able to detect the passing of a mobile node through the entrance and recognize whether the node is entering or exiting the room by calculating the direction of movement as well as the distance from the entrance. This allowed us to distinguish the precise position in an indoor environment with the margin of error being 0.5 m. The signal attenuation due to obstacles is overcome by using LF communication in the 125-kHz band. This approach enables us to reduce the number of initially installed anchor nodes as well as the power consumption of the mobile node. We propose an indoor position recognition system, namely, the hybrid SAIL system, that can be applied to mobile nodes with limited battery capacity by reducing the system complexity and power consumption.
APA, Harvard, Vancouver, ISO, and other styles
32

Sze, K. Y., X. H. Liu, and S. H. Lo. "Hybrid-stress six-node prismatic elements." International Journal for Numerical Methods in Engineering 61, no. 9 (October 12, 2004): 1451–70. http://dx.doi.org/10.1002/nme.1118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Nie, Xin Hua, and Zhong Ming Pan. "Iterated Hybrid Localization Algorithm for Random Wireless Sensor Networks Based on Centroid and DV-Hop Algorithm." Applied Mechanics and Materials 182-183 (June 2012): 1854–57. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1854.

Full text
Abstract:
Localization has been a major challenge in Wireless Sensor Networks (WSNs), especially for the applications requiring the accurate position of the sensed information. In this paper, we propose a new localization algorithm based on the Centroid algorithm and the DV-Hop algorithm to improve the positioning accuracy without increasing any extra hardware for sensor nodes. This paper firstly analyzed the advantages and disadvantages of the centroid algorithm and the DV-Hop algorithm. Then we put forward an iterated hybrid algorithm, which is comprised of three steps. Firstly, obtaining the initial location of each unknown node by using the centroid algorithm; secondly, computing the distances among each unknown node to the anchor nodes based on the DV-Hop algorithm; finally, Taylor Series Expansion (TSE) algorithm is utilized to estimate coordinate of each unknown node. Simulation results show that our iterated hybrid algorithm has better positioning accuracy.
APA, Harvard, Vancouver, ISO, and other styles
34

Tripathi, Arpit, Pulkit Gupta, Aditya Trivedi, and Rahul Kala. "Wireless Sensor Node Placement Using Hybrid Genetic Programming and Genetic Algorithms." International Journal of Intelligent Information Technologies 7, no. 2 (April 2011): 63–83. http://dx.doi.org/10.4018/jiit.2011040104.

Full text
Abstract:
The ease of use and re-configuration in a wireless network has played a key role in their widespread growth. The node deployment problem deals with an optimal placement strategy of the wireless nodes. This paper models a wireless sensor network, consisting of a number of nodes, and a unique sink to which all the information is transmitted using the shortest connecting path. Traditionally the systems have used Genetic Algorithms for optimal placement of the nodes that usually fail to give results in problems employing large numbers of nodes or higher areas to be covered. This paper proposes a hybrid Genetic Programming (GP) and Genetic Algorithm (GA) for solving the problem. While the GP optimizes the deployment structure, the GA is used for actual node placement as per the GP optimized structure. The GA serves as a slave and GP serves as master in this hierarchical implementation. The algorithm optimizes total coverage area, energy utilization, lifetime of the network, and the number of nodes deployed. Experimental results show that the algorithm could place the sensor nodes in a variety of scenarios. The placement was found to be better than random placement strategy as well as the Genetic Algorithm placement strategy.
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Ying, Zheming Zhang, and Bin Zhang. "A Novel Hybrid Optimization Scheme on Connectivity Restoration Processes for Large Scale Industrial Wireless Sensor and Actuator Networks." Processes 7, no. 12 (December 10, 2019): 939. http://dx.doi.org/10.3390/pr7120939.

Full text
Abstract:
In the wireless sensor and actuator networks (WSANs) of industrial field monitoring, maintaining network connectivity with coverage perception plays a decisive role in many industrial process scenarios. The mobile actuator node is responsible for collecting data from the sensing nodes and performing diverse specific collaborative operation tasks. However, the failure of the nodes usually causes coverage vulnerability and partition of the network. Urgent and time-sensitive applications expect a minimum coverage loss to complete an instant connectivity restoration. This paper presents a hybrid coverage perception-based connectivity restoration algorithm, which is designed to restore network connectivity with minimal coverage area loss. The algorithm uses a backup node, which is selected nearby the critical node, to ensure a timely restoration when the critical node encounters failure. In the process of backup node migration, the optimal destination will be reselected to maintain the best network coverage after network connectivity recovery. The effectiveness of the proposed algorithm was verified by some simulation experiments.
APA, Harvard, Vancouver, ISO, and other styles
36

Bhardwaj, Indu, Sibaram Khara, and Priestly Shan. "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 451–62. http://dx.doi.org/10.12694/scpe.v21i3.1743.

Full text
Abstract:
Trust plays essential role in any securing communications between Vehicles in IOV. This motivated us to design a trust model for IoV communication. In this paper, we initially review literature on IoV and Trust and present a hybrid trust model that separates the malicious and trusted nodes to secure the interaction of vehicle in IOV. Node segregation is done using value of statistics (St). If St of each node lies in the range of mean (m) plus/minus 2 standard deviation (SD) of PDR then nodes behaviour is considered as normal otherwise malicious. The simulation is conducted for different threshold values. Result depicts that PDR of trusted node is 0.63 that is much higher than the PDR of malicious node that is 0.15. Similarly, the average no. of hops and trust dynamics of trusted nodes are higher than that of malicious node. So, on the basis of values of PDR, number of available hops and trust dynamics, the malicious nodes can be clearly identified and discarded.
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Wanji, and Y. K. Cheung. "Three-dimensional 8-node and 20-node refined hybrid isoparametric elements." International Journal for Numerical Methods in Engineering 35, no. 9 (November 30, 1992): 1871–89. http://dx.doi.org/10.1002/nme.1620350909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Qiang, Qiang Yi, Rongxin Tang, Xin Qian, Kai Yuan, and Shiyun Liu. "A Hybrid Optimization from Two Virtual Physical Force Algorithms for Dynamic Node Deployment in WSN Applications." Sensors 19, no. 23 (November 22, 2019): 5108. http://dx.doi.org/10.3390/s19235108.

Full text
Abstract:
With the rapid development of unmanned aerial vehicle in space exploration and national defense, large-scale wireless sensor network (WSN) became an important and effective technology. It may require highly accurate locating for the nodes in some real applications. The dynamic node topology control of a large-scale WSN in an unmanned region becomes a hot research topic recently, which helps improve the system connectivity and coverage. In this paper, a hybrid optimization based on two different virtual force algorithms inspired by the interactions among physical sensor nodes is proposed to address the self-consistent node deployment in a large-scale WSN. At the early stage, the deployment algorithm was to deploy the sensor nodes by leveraging the particle motions in dusty plasma to achieve the hexagonal topology of the so-called “Yukawa crystal”. After that, another virtual exchange force model was combined to present a hybrid optimization, which could yield perfect hexagonal topology, better network uniformity, higher coverage rate, and faster convergence speed. The influence of node position, velocity, and acceleration during the node deployment stage on the final network topology are carefully discussed for this scheme. It can aid engineers to control the network topology for a large number of wireless sensors with affordable system cost by choosing suitable parameters based on physical environments or application scenarios in the near future.
APA, Harvard, Vancouver, ISO, and other styles
39

Yu, Lin, Gang Xu, ZhiFei Wang, Na Zhang, and FengQi Wei. "A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value." Security and Communication Networks 2022 (February 9, 2022): 1–12. http://dx.doi.org/10.1155/2022/6343764.

Full text
Abstract:
Routing strategy is one of the most important researches in Opportunistic Internet of Things (IoT), and it highly influences the efficiency of data transmission. In this paper, a hybrid Opportunistic IoT secure routing strategy based on node intimacy and trust value (HIRouter) is proposed to resolve the problem of unbalanced transmission efficiency and security in the message delivery process. According to the records of node encounter and message forwarding, the strategy proposed in this paper can calculate nodes’ intimacy and trust value. The messages are then forwarded based on the intimacy and trust value between nodes. Experimental results verify that HIRouter algorithm we proposed can improve the message delivery rates and reduce the overhead rate in the Opportunistic IoT with dense nodes and frequent interactions between nodes.
APA, Harvard, Vancouver, ISO, and other styles
40

Lin, Tu-Liang, Hong-Yi Chang, and Yu-Hsin Wang. "A Novel Hybrid Search and Remove Strategy for Power Balance Wireless Charger Deployment in Wireless Rechargeable Sensor Networks." Energies 13, no. 10 (May 25, 2020): 2661. http://dx.doi.org/10.3390/en13102661.

Full text
Abstract:
Conventional sensor nodes are often battery-powered, and battery power limits the overall lifetime of the wireless sensor networks (WSNs). Wireless charging technology can be implemented in WSNs to supply power to sensor nodes and resolve the problem of restricted battery power. This type of mixed network is called wireless rechargeable sensor networks (WRSNs). Therefore, wireless charger deployment is a crucial task in WRSNs. In this study, the method of placing wireless chargers to efficiently extend the lifetime of the WRSNs is addressed. Owing to the data forwarding effect in WSNs, sensor nodes that are closer to the data collection or sink node drain more power than nodes that are further away from the data collection or sink node. Therefore, this study proposes a novel hybrid search and removal strategy for the power balance charger deployment method. The wireless chargers are placed in the chosen nodes of the WRSNs. The node-chosen problem we address is called the dominating set problem. The proposed hybrid search and removal strategy attempts to discover the minimum number of chargers required to cover all sensor nodes in the WRSN. The proposed algorithm considers the charging power of the wireless directional charger when arranging its placement to maximize the charging capacity in a power-balanced prerequisite. Therefore, the proposed deployment strategy preserves the awareness of the presence of the sink node that could result in unbalanced power distribution in WRSNs. The simulation results show that the proposed strategy spares more chargers and achieves better energy efficiency than other deployment approaches.
APA, Harvard, Vancouver, ISO, and other styles
41

Zaman, Mukter, H. Y. Wong, Md Shabiul Islam, and Nowshad Amin. "An Integrated Hybrid Energy Harvester for Autonomous Wireless Sensor Network Nodes." International Journal of Photoenergy 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/760534.

Full text
Abstract:
Profiling environmental parameter using a large number of spatially distributed wireless sensor network (WSN) NODEs is an extensive illustration of advanced modern technologies, but high power requirement for WSN NODEs limits the widespread deployment of these technologies. Currently, WSN NODEs are extensively powered up using batteries, but the battery has limitation of lifetime, power density, and environmental concerns. To overcome this issue, energy harvester (EH) is developed and presented in this paper. Solar-based EH has been identified as the most viable source of energy to be harvested for autonomous WSN NODEs. Besides, a novel chemical-based EH is reported as the potential secondary source for harvesting energy because of its uninterrupted availability. By integrating both solar-based EH and chemical-based EH, a hybrid energy harvester (HEH) is developed to power up WSN NODEs. Experimental results from the real-time deployment shows that, besides supporting the daily operation of WSN NODE and Router, the developed HEH is capable of producing a surplus of 971 mA·hr equivalent energy to be stored inside the storage for NODE and 528.24 mA·hr equivalent energy for Router, which is significantly enough for perpetual operation of autonomous WSN NODEs used in environmental parameter profiling.
APA, Harvard, Vancouver, ISO, and other styles
42

Fan, Na, Shuai Shen, Chase Q. Wu, and Junfeng Yao. "A hybrid trust model based on communication and social trust for vehicular social networks." International Journal of Distributed Sensor Networks 18, no. 5 (May 2022): 155013292210975. http://dx.doi.org/10.1177/15501329221097588.

Full text
Abstract:
Vehicular social networks are emerging hybrid networks that combine traditional vehicular networks and social networks, with two key types of nodes, that is, vehicles and drivers. Since vehicle behaviors are controlled or influenced by drivers, the trustworthiness of a vehicle node is essentially determined by its own communication behaviors and its driver’s social characteristics. Therefore, human factors should be considered in securing the communication in vehicular social networks. In this article, we propose a hybrid trust model that considers both communication trust and social trust. Within the proposed scheme, we first construct a communication trust model to quantify the trust value based on the interactions between vehicle nodes, and then develop a social trust model to measure the social trust based on the social characteristics of vehicle drivers. Based on these two trust models, we compute the combined trust assessment of a vehicle node in vehicular social networks. Extensive simulations show that the proposed hybrid trust model improves the accuracy in evaluating the trustworthiness of vehicle nodes and the efficiency of communication in vehicular social networks.
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Yang, Zhi Hong Qian, Lin Han Feng, and Yu Qi Guo. "ZigBee Hybrid Routing Optimization Algorithm Based on Energy Balance." Advanced Materials Research 765-767 (September 2013): 1667–70. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1667.

Full text
Abstract:
Aiming at energy consumption problem in the ZBR hybrid routing algorithm, an improved algorithm (W-ZBR) based on ZBR routing protocol is proposed to reduce the network energy consumption. The algorithm was improved mainly from the following parts: Cluster-tree routing algorithm and AODVjr routing algorithm. In Cluster-tree routing algorithm the redundant packet of RREQ is limited to reduce energy consumption by setting the parent node id. In AODVjr routing algorithm the network energy consumption is balanced by monitoring the remaining energy of nodes. The simulation result indicated that W-ZBR performs better than ZBR in remaining energy ratio, routing overhead ratio, available node ratio and packet delivery ratio. The algorithm can also prolong the life span of network.
APA, Harvard, Vancouver, ISO, and other styles
44

Lai, Cheng Yu, and Xiao Guang Fu. "Research of Hybrid Congestion Control Mechanism." Advanced Materials Research 426 (January 2012): 275–78. http://dx.doi.org/10.4028/www.scientific.net/amr.426.275.

Full text
Abstract:
In wireless sensor networks, congestion causes overall channel quality to degrade and loss rates to raise, leads to buffer drops and increased delays, and tends to be grossly unfair toward nodes whose data has to traverse a larger number of radio hops. Hybrid congestion control mechanisms relieve the congestion by creating the new path; when establishment of a new path is failed, fairness aggregate mechanisms limits forward rate, ensures that each source node sends data fairly. Based on energy-saving, algorithms for mild congestion have been improved.
APA, Harvard, Vancouver, ISO, and other styles
45

Volterrani, Marco, Simone Magni, Monica Gaetani, and Filippo Lulli. "Trinexapac-ethyl Effects on Stolon Activity and Node Vitality of ‘Tifway’ Hybrid Bermudagrass." HortTechnology 22, no. 4 (August 2012): 479–83. http://dx.doi.org/10.21273/horttech.22.4.479.

Full text
Abstract:
The stoloniferous-rhizomatous growth habit of bermudagrass [Cynodon dactylon (L.) Pers.] is a key feature for fast turf establishment and effective recovery from wear and divots. Trinexapac-ethyl (TE) is a plant growth regulator used extensively to reduce the need for mowing. However, vertical growth suppression of vertical growth has the potential to reduce horizontal growth. Furthermore, side effects reported on several physiological functions could affect node ability to generate new plants. In a greenhouse trial, ‘Tifway’ hybrid bermudagrass (C. dactylon × C. transvaalensis Burtt Davy) grown in pots was treated with increasing rates of TE (untreated control, 0.015, 0.075, 0.150, and 0.300 g·m−2). The treatment effects on the number of stolons produced and their linear growth rate, node production, node vitality, and daughter plant characteristics were investigated. The effects of growth inhibition because of TE application on nodes and daughter plants and the relative duration were also assessed. Starting from 2 weeks after treatment (2 WAT), TE application resulted in reductions of stolon length of 24.6% and 52.9% compared with the untreated control, while at 3 and 4 WAT only 0.150 and 0.300 g·m−2 application rates produced significant reductions in stolon length with values of 37.1% and 52.9% at 3 WAT and of 34.1% and 48.3% at 4 WAT, respectively. The number of nodes per stolon was unaffected by treatments. No effect was observed in node vitality but daughter plants showed a postinhibition growth enhancement when nodes were excised at 4 WAT. TE application at the labeled rate did not affect the number of stolons produced by ‘Tifway’ hybrid bermudagrass compared with untreated control, while a reduction in stolon growth rate was recorded only at 2 WAT. Application at higher rates reduced stolon growth rate longer than labeled rate but not stolon production. None of the treatments reduced the number of vital nodes. Application rates higher than labeled rate produced a postinhibition growth enhancement in plants that originated from nodes excised at 4 WAT.
APA, Harvard, Vancouver, ISO, and other styles
46

Jaisakthi, K., and S. Nithyadhevi. "Location Privacy and Lifetime Maximization using Low Energy Adaptive Technique in WSN." International Journal of Advance Research and Innovation 3, no. 1 (2015): 48–51. http://dx.doi.org/10.51976/ijari.311508.

Full text
Abstract:
In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. In the privacy preserving location monitoring system for wireless sensor networks can be design to enable the system to provide high quality location monitoring services for system users, while preserving personal location privacy. Hybrid Cluster Structure (CS) used for sensor networks to improve the lifetime by using Low Energy Adaptive (LEA) protocol. The sensor nodes are organized into clusters. Within a cluster, nodes transmit data to cluster head (CH) without using Cluster Structure. All CHs are interconnected in CS mode to transmit data to sink. Hybrid Cluster Structure (CS) used for sensor networks. The sensor nodes are organized into clusters. Within a cluster, nodes transmit data to cluster head (CH) without using Cluster Structure.CH can be select by using stochastic algorithm. All CHs are interconnected in CS mode to transmit data to sink.
APA, Harvard, Vancouver, ISO, and other styles
47

Arip Winanto, Eko, Mohd Yazid Idris, Deris Stiawan, and Mohammad Sulkhan Nurfatih. "Designing consensus algorithm for collaborative signature-based intrusion detection system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 485. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp485-496.

Full text
Abstract:
<span>Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability of nodes to provide IDS attack signatures. Each node in the network is responsible to provide new attack signature to be shared with other node. There are two problems exist in CIDS highlighted in this paper, first is to provide data consistency and second is to maintain trust among the nodes while sharing the attack signatures. Recently, researcher find that blockchain has a great potential to solve those problems. Consensus algorithm in blockchain is able to increase trusts among the node and allows data to be inserted from a single source of truth. In this paper, we are investigating three blockchain consensus algorithms: proof of work (PoW), proof of stake (PoS), and hybrid PoW-PoS chain-based consensus algorithm which are possibly to be implemented in CIDS. Finally, we design an extension of hybrid PoW-PoS chain-based consensus algorithm to fulfill the requirement. This extension we name it as proof of attack signature (PoAS).</span>
APA, Harvard, Vancouver, ISO, and other styles
48

Hu, Li Shuang, Ming Shan Liu, Yuan Zhou, and Yang Sun. "Hybrid Decoding Algorithm for LDPC Codes with Circles." Advanced Materials Research 271-273 (July 2011): 258–63. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.258.

Full text
Abstract:
At present, Low-Density Parity-Check (LDPC) codes widely used in many fields of communications have the best performance of all the Error Correcting Codes (ECC). This paper mainly studies the decoding algorithms of LDPC. It proposes an improved algorithm which is named Check-Variable nodes Hybrid(CVH) algorithm on the basis of the existing algorithms. The CVH algorithm can reduce the computational complexity during the check-node update while overcome with the correlation between the variable-node news in a code with circles. As well as, comparing with the original algorithms the performance of the new one saves 0.1 and 0.3 dB than Log-likelihood Ratios (LLR) Belief Propagation (BP) and BP - based algorithms under Additive White Gaussian Noise (AWGN) channel when the Bit Error Rate (BER) falls to through the simulation. This point shows that this algorithm can increase the decoding performance and reduce the error rate effectively.
APA, Harvard, Vancouver, ISO, and other styles
49

Basha, Adam Raja, and Calpakkam Yaashuwanth. "Double Secure Optimal Partial Aggregation Using Trust Inference and Hybrid Syncryption Algorithm for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 15, no. 2 (February 1, 2018): 423–36. http://dx.doi.org/10.1166/jctn.2018.7106.

Full text
Abstract:
A reliable security mechanism for data aggregation is most wanted due to the rapid growth in wireless sensor network (WSN) applications. Many research works have been focus to obtain confidentiality and integrity. Data aggregation is a challenging process, for one of the reason security issues can arrived at aggregated node. In this paper, we propose a double secure optimal partial aggregation (DS-OPA), which provides secure data aggregation without compromise network performance. The proposed DS-OPA technique consists of two phase. In first phase, we propose multi-objective differential evolution based inference (MDEI) model to compute the trusted aggregated node among multiple nodes in neighbor. The time varying constraints gather from aggregated nodes are optimize by proposed Jaya optimization algorithm. The selected aggregation node successfully received multiple input and produce single output without loss. In second phase, we use hybrid syncryption public key algorithm used to protect data privacy, which avoid data modification in aggregated node. To demonstrate their performance, we implemented our proposed DS-OPA system in network simulator tool with large network size. The simulation results prove that our proposed DS-OPA system are perfectly suited than existing systems.
APA, Harvard, Vancouver, ISO, and other styles
50

D’ALCHÉ-BUC, FLORENCE, DIDIER ZWIERSKI, and JEAN-PIERRE NADAL. "TRIO LEARNING: A NEW STRATEGY FOR BUILDING HYBRID NEURAL TREES." International Journal of Neural Systems 05, no. 04 (December 1994): 259–74. http://dx.doi.org/10.1142/s012906579400027x.

Full text
Abstract:
Neural trees are constructive algorithms which build decision trees whose nodes are binary neurons. We propose a new learning scheme, “trio-learning,” which leads to a significant reduction in the tree complexity. In this strategy, each node of the tree is optimized by taking into account the knowledge that it will be followed by two son nodes. Moreover, trio-learning can be used to build hybrid trees, with internal nodes and terminal nodes of different nature, for solving any standard tasks (e.g. classification, regression, density estimation). Significant results on a handwritten character classification are presented.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography