-
61
Le déploiement des réseaux communautaires sans fil (MESH)
Published 2017-04-01Subjects: Get full text
Article -
62
Optimizing Energy and Spectral Efficiency in Mobile Networks: A Comprehensive Energy Sustainability Framework for Network Operators
Published 2025-01-01Subjects: Get full text
Article -
63
Investigation of Randomly Populated Cylindrical, Spherical, and Cubical Arrays for Application in Space, Aerial, and Underwater Collaborative Beamforming
Published 2024-01-01Subjects: “…Ad hoc wireless network…”
Get full text
Article -
64
Path selection algorithms for connecting wireless base stations to power centers in a mine
Published 2025-01-01Subjects: Get full text
Article -
65
A mm-Wave 5G Double Slot Array Antenna Based on Gap Waveguide Technology and Glide Symmetries
Published 2025-01-01Subjects: “…5G wireless networks…”
Get full text
Article -
66
WiFi and WiMAX Secure Deployments
Published 2010-01-01“…One serious concern in the rapidly developing wireless networking market has been the security of the deployments since the information is delivered freely in the air and therefore privacy and integrity of the transmitted information, along with the user-authentication procedures, become a very important issue. …”
Get full text
Article -
67
: Mobility-Centric Roadside Units Deployment for Vehicular Networks
Published 2013-03-01“…With the increase of the storage capacity, computing, and wireless networking of the vehicular embedded devices, the vehicular networks bring a potential to enable new applications for drivers and passengers in the vehicles. …”
Get full text
Article -
68
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01“…Wireless mesh networks (WMNs) are a promising networking paradigm for next generation wireless networking system. Power control plays a vital role in WMNs and is realized to be a crucial step toward large-scale WMNs deployment. …”
Get full text
Article -
69
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. …”
Get full text
Article -
70
Monitoring of train-induced vibrations on rock slopes
Published 2017-01-01“…To monitor the effects of such vibrations on slope stability, a wirelessly networked vibration test system was established, which included wirelessly networked vibration meters, high-precision and high-speed three-dimensional sensors and a remote wirelessly networked data server system. …”
Get full text
Article -
71
BandEst: Measurement-Based Available Bandwidth Estimation and Flow Admission Control Algorithm for Ad Hoc IEEE 802.15.4-Based Wireless Multimedia Networks
Published 2015-03-01“…Extensive simulations are performed to compare BandEst with the state-of-the-art available-bandwidth-based flow admission control algorithms for ad hoc wireless networks. Our simulation results demonstrate that BandEst significantly outperforms the state-of-the-art available-bandwidth-based flow admission control algorithms for ad hoc wireless networks.…”
Get full text
Article -
72
Available Bandwidth Estimation in Network-Aware Applications for Wireless Campus e-Learning System
Published 2012-01-01“…The constraint of a wireless network has motivated many researchers to develop network-aware applications that can dynamically adjust the users' demand based on network resources. …”
Get full text
Article -
73
Wireless Coexistence between IEEE 802.11- and IEEE 802.15.4-Based Networks: A Survey
Published 2011-07-01“…With low transmit power, the widely deployed IEEE 802.15.4-based networks are easily interfered with by other 2.4 GHz wireless networks, such as IEEE 802.11. IEEE 802.15.4-based wireless networks have paid great attention to the coexistence between themselves and with other non-IEEE 802.15.4 wireless networks. …”
Get full text
Article -
74
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
Get full text
Article -
75
An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks
Published 2014-01-01Get full text
Article -
76
Crop Growth Monitoring Through integration of WSN and IoT
Published 2022-09-01“…The paper also highlights the importance and usefulness of wireless network and other related terminology in this area. …”
Get full text
Article -
77
Exploiting social reciprocity for auction-based spectrum allocation in femtocell networks
Published 2017-06-01“…Spectrum auction is a promising approach to allocate spectrum resources in wireless networks. Most of the previous works ignored social characteristics of users in wireless networks which influence the allocation of spectrum resources. …”
Get full text
Article -
78
Online auction-based resource scheduling in grid computing networks
Published 2016-10-01“…The aim of this article is to introduce a novel auction-based algorithm for grid computing wireless networks and resolve some incompetence with dynamic mechanisms. …”
Get full text
Article -
79
A Use of Fuzzy TOPSIS to Improve the Network Selection in Wireless Multiaccess Environments
Published 2020-01-01“…Constantly faster, mobile terminals are developing, as well as wireless networks, to satisfy the growth of “Always Best Connected” demand. …”
Get full text
Article -
80
Network Efficient Power Control for Wireless Communication Systems
Published 2014-01-01“…Simulation results show that substantial utility gains may be achieved by improving the power management in the wireless network.…”
Get full text
Article