-
61
Investigation of Randomly Populated Cylindrical, Spherical, and Cubical Arrays for Application in Space, Aerial, and Underwater Collaborative Beamforming
Published 2024-01-01Subjects: “…Ad hoc wireless network…”
Get full text
Article -
62
Path selection algorithms for connecting wireless base stations to power centers in a mine
Published 2025-01-01Subjects: Get full text
Article -
63
Optimizing Energy and Spectral Efficiency in Mobile Networks: A Comprehensive Energy Sustainability Framework for Network Operators
Published 2025-01-01Subjects: Get full text
Article -
64
Automatic Multitarget Detection Method Based on Distributed Through-wall Radar
Published 2025-02-01Subjects: Get full text
Article -
65
A mm-Wave 5G Double Slot Array Antenna Based on Gap Waveguide Technology and Glide Symmetries
Published 2025-01-01Subjects: “…5G wireless networks…”
Get full text
Article -
66
Available Bandwidth Estimation in Network-Aware Applications for Wireless Campus e-Learning System
Published 2012-01-01“…The constraint of a wireless network has motivated many researchers to develop network-aware applications that can dynamically adjust the users' demand based on network resources. …”
Get full text
Article -
67
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
Get full text
Article -
68
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. …”
Get full text
Article -
69
Crop Growth Monitoring Through integration of WSN and IoT
Published 2022-09-01“…The paper also highlights the importance and usefulness of wireless network and other related terminology in this area. …”
Get full text
Article -
70
Indoor Massive MIMO Channel Modelling Using Ray-Launching Simulation
Published 2014-01-01“…We simulate the models in indoor wireless network deployment environments and compare the simulation results with measurements. …”
Get full text
Article -
71
Enabling Cognitive Load-Aware AR with Rateless Coding on a Wearable Network
Published 2008-01-01“…Augmented reality (AR) on a head-mounted display is conveniently supported by a wearable wireless network. If, in addition, the AR display is moderated to take account of the cognitive load of the wearer, then additional biosensors form part of the network. …”
Get full text
Article -
72
IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing
Published 2015-01-01“…User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. …”
Get full text
Article -
73
Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network
Published 2014-01-01“…In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. …”
Get full text
Article -
74
Effect of Intelligent Reflecting Surface on WSN Communication With Access Points Configuration
Published 2025-01-01“…This enabled direct and indirect WSN sensor node communication and provided a comparison of how effective an IRS can be on improving the Quality of links and communication channel in a wireless network. The work looked at three distinct, but related cases of SNR covering IRS elements, access point numbers, and IRS location. …”
Get full text
Article -
75
Research on WiFi Penetration Testing with Kali Linux
Published 2021-01-01“…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. …”
Get full text
Article -
76
Enhanced zebra optimization algorithm and applications of power allocation in SDWN
Published 2025-01-01“…To address the issue of interference caused by shared resources in multi-user communications in software defined wireless network (SDWN), an enhanced zebra optimization algorithm (EZOA) was proposed to achieve power allocation that maximizes the secrecy rate. …”
Get full text
Article -
77
An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks
Published 2014-05-01“…In addition, the traffic flow situation is also transmitted to a remote monitoring control system through ZigBee wireless network communication technology. The traffic flow control system developed in this study can perform remote transmission and reduce traffic accidents. …”
Get full text
Article -
78
Enabling Collaborative Musical Activities through Wireless Sensor Networks
Published 2012-03-01“…This network has been named collaborative musical wireless network (CMWN): it eases device configuration, enables musical collaboration, and allows artists to explore new ways of expression. …”
Get full text
Article -
79
Application of Intelligent Sensor in Mining Electrical Equipment Collection
Published 2022-01-01“…The system uses a variety of sensor fusion methods, with the help of Zigbee wireless network nodes, and passes the data collected by the sensor to the MCU core processor; thus, the collected data are processed, and then, the RS-485 communication protocol is used to upload the data to the upper station; finally, the monitoring of coal mine safety is realized through the background monitoring interface. …”
Get full text
Article -
80
Deep Learning Techniques for Peer-to-Peer Physical Systems Based on Communication Networks
Published 2022-01-01“…For further investigation, you are more likely to pass this test using a data-driven program and increasing the exposure of your wireless network with limited distance resources. This study focuses on various deep learning strategies used in peer-to-peer communication networks. …”
Get full text
Article