期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
无线传感网络技术研究与应用 被引量:5
1
作者 张婷婷 《科技信息》 2011年第2期231-231,共1页
随着无线通信技术的不断发展,无线传感网络应运而生,已成为当前国内外研究的热点。文章首先介绍了无线传感网络的起源和发展历程,对无线传感网络的基本内容和研究现状进行了探讨,最后给出了当前无线传感网络的一些典型应用。
关键词 无线网络 无线传感网络应用 无缝连接
下载PDF
基于无线传感器网络定位技术的图书馆智能管理创新 被引量:3
2
作者 罗桦 陈勇 +2 位作者 张清 赵滟 黄猛 《大学图书情报学刊》 2016年第2期50-52,57,共4页
"互联网+"时代,信息技术的发展对图书馆的智能化管理工作提出了更高的要求。文章概述了无线传感器网络与定位技术,重点讨论了如何将WSN定位技术运用到图书智能管理,通过定位技术与大数据、云计算等信息技术的结合,推动图书馆... "互联网+"时代,信息技术的发展对图书馆的智能化管理工作提出了更高的要求。文章概述了无线传感器网络与定位技术,重点讨论了如何将WSN定位技术运用到图书智能管理,通过定位技术与大数据、云计算等信息技术的结合,推动图书馆智能系统建设和智能化发展。 展开更多
关键词 图书馆 智能管理 无线网络 定位技术 互联网+
下载PDF
Distributed Connectivity Restoration Strategy for Movable Sensor Networks 被引量:1
3
作者 MA Guizhen YANG Yang +3 位作者 QIU Xuesong GAO Zhipeng LI He XIAO Xiangyue 《China Communications》 SCIE CSCD 2014年第A01期156-163,共8页
Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Str... Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments. 展开更多
关键词 movable sensor networks connectivity recovery critical node
下载PDF
A low power quadrature up-conversion mixer for WSN application
4
作者 吴晨健 Li Zhiqun 《High Technology Letters》 EI CAS 2013年第3期228-232,共5页
This paper presents an up-conversion mixer for 2.4GHz wireless sensor networks in 0. 181xm RF complementary metal-oxide semiconductor (CMOS) technology. It is based on a double-balanced Gilbert cell type. With two G... This paper presents an up-conversion mixer for 2.4GHz wireless sensor networks in 0. 181xm RF complementary metal-oxide semiconductor (CMOS) technology. It is based on a double-balanced Gilbert cell type. With two Gilbert cells it was applied quadrature modulation. Operational ampli- tiers are used in this design to improve the conversion gain under low power consumption. The mixer design is based on 0.18txm RF CMOS process. And the mixer test results indicate that under 1.8V power supply, with input frequency 2.4 - 2.4835GHz, the conversion voltage gain is 1.2 - 2dB. When the output frequency is 2.4GHz, its power gain is -4.46dB, and its input referred 1 dB com- pression point is -11.5dBm and it consumes 1.77mA current. 展开更多
关键词 MIXER low power Gilbert operational amplifier
下载PDF
Secure encryption embedded processor design for wireless sensor network application
5
作者 霍文捷 Liu Zhenglin Zou Xuecheng 《High Technology Letters》 EI CAS 2011年第1期75-79,共5页
This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Adv... This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out. 展开更多
关键词 embedded processor security memory encryption wireless sensor network (WSN) CACHE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部