Learn More
Wireless rechargeable sensor networks (WRSNs) have emerged as an alternative to solving the challenges of size and operation time posed by traditional battery-powered systems. In this paper, we study a WRSN built from the industrial wireless identification and sensing platform (WISP) and commercial off-the-shelf RFID readers. The paper-thin WISP tags serve(More)
Crowdsensing offers an efficient approach to meet the demand in large scale sensing applications. In crowdsensing, it is of great interest to find the optimal task allocation, which is challenging since sensing tasks with different requirements of quality of sensing are typically associated with specific locations and mobile users are constrained by time(More)
We consider the problem of gathering correlated sensor data by a single sink node in a wireless sensor network. We assume that the sensor nodes are energy constrained and design efficient distributed protocols to maximize the network lifetime. Many existing approaches focus on optimizing the routing layer only, but in fact the routing strategy is often(More)
—A promising technology that tackles the conflict between spectrum scarcity and under-utilization is cognitive radio (CR), of which spectrum sensing is one of the most important functionalities. The use of dedicated sensors is an emerging service for spectrum sensing, where multiple sensors perform cooperative spectrum sensing. However, due to energy(More)
This is an open access article distributed under the Creative Commons Attribution 2.5 Canada License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract In this paper, we formulate multi-channel assignment in Wireless Sensor Networks (WSNs) as an optimization problem and show(More)
Wireless Sensor Network (WSN) is increasingly popular in the field of micro-environmental monitoring due to its promising capability. However, most systems using WSN for environmental monitoring reported in the literature are developed for specific applications without functions for exploiting user's data processing methods. In this paper, a new system is(More)