Due to dense deployment and innumerable amount of traffic flow in wireless sensor networks (WSNs), congestion becomes more common phenomenon from simple periodic traffic to unpredi...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
This work reports the experience on the design and deployment of a WSN-based system for monitoring the productive cycle of high-quality wine in a Sicilian winery. Besides providin...
Giuseppe Anastasi, Orazio Farruggia, Giuseppe Lo R...
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...
When tracking a target using phase-only signal returns, range ambiguities are a major issue. In this work, a look-up table between phase measurement space and target location spac...
Yongqiang Cheng, Xuezhi Wang, Terry Caelli, Bill M...