Online Source Recovery Algorithm with Dynamic Source Number for WSDM in the Noisy Case

Author(s):  
Qiao Su ◽  
Yuehong Shen ◽  
Yimin Wei ◽  
Changliang Deng ◽  
Junnan Xu
2009 ◽  
Vol 36 (5) ◽  
pp. 8855-8861 ◽  
Author(s):  
Tsung-Ying Sun ◽  
Chan-Cheng Liu ◽  
Shang-Jeng Tsai ◽  
Sheng-Ta Hsieh

2011 ◽  
Vol E94-C (5) ◽  
pp. 802-806 ◽  
Author(s):  
Ryoto YAGUCHI ◽  
Fumiyuki ADACHI ◽  
Takao WAHO

2014 ◽  
Vol E97.C (5) ◽  
pp. 419-422
Author(s):  
Masayuki YAMADA ◽  
Ken UCHIDA ◽  
Yasuyuki MIYAMOTO

Trust is critical in remote sensor systems to exchange the information from source to goal. The Dynamic Source Protocol computes the substitute way, if any hub neglects to exchange the information. The Dynamic Source Protocol does not have any worked in usefulness to figure a substitute way if the way has a vindictive hub. With the cost of an interloper recognition framework we can identify the vindictive hub and modify the information/parcel exchange way. Notwithstanding, gatecrasher location framework is extremely costly for remote sensor systems and there is no certification in identifying a malevolent hub. In the ebb and flow look into a trust-based approach is prescribed to limit the overheads of gatecrasher location framework and it likewise recognizes the anomalous conduct hubs. The proposed demonstrate utilizes the rehashed recreations to distinguish flawed hubs through the agreeable exertion in the sensor organize and additionally judges the trust of progressive hubs. Reenactments were exhibited for standardized result of parcel dropping, normal rebate result, and trust connection.


2013 ◽  
Vol 24 (5) ◽  
pp. 1098-1110
Author(s):  
Yu-Xing SUN ◽  
Li XIE ◽  
Yi-Fei CHEN

Sign in / Sign up

Export Citation Format

Share Document