Showing 61 - 80 results of 193 for search '"wireless network"', query time: 0.06s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66

    Available Bandwidth Estimation in Network-Aware Applications for Wireless Campus e-Learning System by Mohd Faisal Ibrahim, Masita Jamal, Saadiah Yahya, Mohd Nasir Taib

    Published 2012-01-01
    “…The constraint of a wireless network has motivated many researchers to develop network-aware applications that can dynamically adjust the users' demand based on network resources. …”
    Get full text
    Article
  7. 67

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
    Get full text
    Article
  8. 68

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. …”
    Get full text
    Article
  9. 69

    Crop Growth Monitoring Through integration of WSN and IoT by Haoran yu

    Published 2022-09-01
    “…The paper also highlights the importance and usefulness of wireless network and other related terminology in this area. …”
    Get full text
    Article
  10. 70

    Indoor Massive MIMO Channel Modelling Using Ray-Launching Simulation by Jialai Weng, Xiaoming Tu, Zhihua Lai, Sana Salous, Jie Zhang

    Published 2014-01-01
    “…We simulate the models in indoor wireless network deployment environments and compare the simulation results with measurements. …”
    Get full text
    Article
  11. 71

    Enabling Cognitive Load-Aware AR with Rateless Coding on a Wearable Network by R. Razavi, M. Fleury, M. Ghanbari

    Published 2008-01-01
    “…Augmented reality (AR) on a head-mounted display is conveniently supported by a wearable wireless network. If, in addition, the AR display is moderated to take account of the cognitive load of the wearer, then additional biosensors form part of the network. …”
    Get full text
    Article
  12. 72

    IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing by Aymen Abdullah Alsaffar, Young-Rok Shin, Eui-Nam Huh

    Published 2015-01-01
    “…User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. …”
    Get full text
    Article
  13. 73

    Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network by Shigeru Kashihara, Takuma Hayashi, Yuzo Taenaka, Takeshi Okuda, Suguru Yamaguchi

    Published 2014-01-01
    “…In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. …”
    Get full text
    Article
  14. 74

    Effect of Intelligent Reflecting Surface on WSN Communication With Access Points Configuration by Mahmoud Z. Iskandarani

    Published 2025-01-01
    “…This enabled direct and indirect WSN sensor node communication and provided a comparison of how effective an IRS can be on improving the Quality of links and communication channel in a wireless network. The work looked at three distinct, but related cases of SNR covering IRS elements, access point numbers, and IRS location. …”
    Get full text
    Article
  15. 75

    Research on WiFi Penetration Testing with Kali Linux by He-Jun Lu, Yang Yu

    Published 2021-01-01
    “…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. …”
    Get full text
    Article
  16. 76

    Enhanced zebra optimization algorithm and applications of power allocation in SDWN by LI Jiajia, DONG Ligang, JIANG Xian

    Published 2025-01-01
    “…To address the issue of interference caused by shared resources in multi-user communications in software defined wireless network (SDWN), an enhanced zebra optimization algorithm (EZOA) was proposed to achieve power allocation that maximizes the secrecy rate. …”
    Get full text
    Article
  17. 77

    An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks by Kuei-Hsiang Chao, Pi-Yun Chen

    Published 2014-05-01
    “…In addition, the traffic flow situation is also transmitted to a remote monitoring control system through ZigBee wireless network communication technology. The traffic flow control system developed in this study can perform remote transmission and reduce traffic accidents. …”
    Get full text
    Article
  18. 78

    Enabling Collaborative Musical Activities through Wireless Sensor Networks by Santiago J. Barro, Tiago M. Fernández-Caramés, Carlos J. Escudero

    Published 2012-03-01
    “…This network has been named collaborative musical wireless network (CMWN): it eases device configuration, enables musical collaboration, and allows artists to explore new ways of expression. …”
    Get full text
    Article
  19. 79

    Application of Intelligent Sensor in Mining Electrical Equipment Collection by Jing Chang, Fating Zhang, Yuyu Zhu

    Published 2022-01-01
    “…The system uses a variety of sensor fusion methods, with the help of Zigbee wireless network nodes, and passes the data collected by the sensor to the MCU core processor; thus, the collected data are processed, and then, the RS-485 communication protocol is used to upload the data to the upper station; finally, the monitoring of coal mine safety is realized through the background monitoring interface. …”
    Get full text
    Article
  20. 80

    Deep Learning Techniques for Peer-to-Peer Physical Systems Based on Communication Networks by Ajay. P, Nagaraj. B, Ruihang Huang

    Published 2022-01-01
    “…For further investigation, you are more likely to pass this test using a data-driven program and increasing the exposure of your wireless network with limited distance resources. This study focuses on various deep learning strategies used in peer-to-peer communication networks. …”
    Get full text
    Article