Showing 701 - 720 results of 1,748 for search '"Wireless"', query time: 0.07s Refine Results
  1. 701

    Implementasi Algoritme Evolusioner NSGA-II pada Optimasi Daya Wireless Power Transfer Multi-Penerlima by Sabriansyah Rizqika Akbar, Eko Setiawan, Agung Setiabudi

    Published 2022-12-01
    “… Wireless Power Transfer (WPT) merupakan teknologi yang dapat menghantarkan energi listrik tanpa kabel. …”
    Get full text
    Article
  2. 702
  3. 703
  4. 704

    On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks by Jun He, Zheng Yang, Jianxun Zhang, Wanping Liu, Chao Liu

    Published 2018-01-01
    “…In a recent paper, Chang and Le proposed an efficient smart card–based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. …”
    Get full text
    Article
  5. 705
  6. 706

    Multiple Power-Saving MSSs Scheduling Methods for IEEE802.16e Broadband Wireless Networks by Shih-Chang Huang

    Published 2014-01-01
    “…This work proposes two enhanced multiple mobile subscriber stations (MSSs) power-saving scheduling methods for IEEE802.16e broadband wireless networks. The proposed methods are designed for the Unsolicited Grant Service (UGS) of IEEE802.16e. …”
    Get full text
    Article
  7. 707

    Towards neuromorphic compression based neural sensing for next-generation wireless implantable brain machine interface by Vivek Mohan, Wee Peng Tay, Arindam Basu

    Published 2025-01-01
    “…This work introduces a neuromorphic compression based neural sensing architecture with address-event representation inspired readout protocol for massively parallel, next-gen wireless implantable brain machine interface (iBMI). …”
    Get full text
    Article
  8. 708
  9. 709
  10. 710
  11. 711

    Various Techniques for Charging Lithium-Ion Batteries in Electric Vehicles Using Wireless Power Transfer Chargers by El Ancary Marouane, Lassioui Abdellah, El Fadil Hassan, Hasni Anwar, El Asri Yassine, Yahya Abdelhafid

    Published 2025-01-01
    “…Precise voltage and current regulation is essential to ensure the required power output and maximum efficiency in charging stations, particularly those utilizing Wireless Power Transfer (WPT) systems. Effective regulation techniques are necessary to manage voltage and current in Battery Electric Vehicles (BEVs) operating under various charging modes. …”
    Get full text
    Article
  12. 712
  13. 713

    Temperature-Compensated Damage Monitoring by Using Wireless Acceleration-Impedance Sensor Nodes in Steel Girder Connection by Dong-Soo Hong, Khac-Duy Nguyen, In-Cheol Lee, Jeong-Tae Kim

    Published 2012-09-01
    “…Temperature-compensated damage monitoring in steel girder connections by using wireless acceleration-impedance sensor nodes is experimentally examined. …”
    Get full text
    Article
  14. 714

    VGDD: A Virtual Grid Based Data Dissemination Scheme for Wireless Sensor Networks with Mobile Sink by Abdul Waheed Khan, Abdul Hanan Abdullah, Mohammad Abdur Razzaque, Javed Iqbal Bangash, Ayman Altameem

    Published 2015-02-01
    “…Wireless sensor network (WSN) is considered as the enabling technology to bridge the gap between the physical and digital world. …”
    Get full text
    Article
  15. 715

    More Benefits of Adding Sparse Random Links to Wireless Networks: Yet Another Case for Hybrid Networks by Gunes Ercal

    Published 2012-06-01
    “…We theoretically and experimentally analyze the process of adding sparse random links to random wireless networks modeled as a random geometric graph. …”
    Get full text
    Article
  16. 716

    Differential Games of Rechargeable Wireless Sensor Networks against Malicious Programs Based on SILRD Propagation Model by Guiyun Liu, Baihao Peng, Xiaojing Zhong, Xuejing Lan

    Published 2020-01-01
    “…Based on the traditional propagation model, this paper innovatively divides nodes into high- and low-energy states through introducing Low-energy (L) state and presents a whole new propagation model which is more suitable for WSNs (wireless sensor networks) against malicious programs, namely, SILRD (Susceptible, Infected, Low-energy, Recovered, Dead) model. …”
    Get full text
    Article
  17. 717

    Smart Wireless Power Transfer Operated by Time-Modulated Arrays via a Two-Step Procedure by Diego Masotti, Alessandra Costanzo, Vittorio Rizzoli

    Published 2015-01-01
    “…The paper introduces a novel method for agile and precise wireless power transmission operated by a time-modulated array. …”
    Get full text
    Article
  18. 718

    A cross-layer approach to message authentication based on sparse representation for wireless body area networks by Ning Wang, Weiwei Li, Ting Jiang

    Published 2017-03-01
    “…Due to personal privacy, information security is a particularly important issue in wireless body area networks. Although current communication protocol has considered the security, there is still a risk that lapses in physical layer security may be a potential threat in wireless body area networks. …”
    Get full text
    Article
  19. 719

    A new approach of anomaly detection in wireless sensor networks using support vector data description by Zhen Feng, Jingqi Fu, Dajun Du, Fuqiang Li, Sizhou Sun

    Published 2017-01-01
    “…Anomaly detection is an important challenge in wireless sensor networks for some applications, which require efficient, accurate, and timely data analysis to facilitate critical decision making and situation awareness. …”
    Get full text
    Article
  20. 720

    A Three-Phase Top- Query Based Distributed Data Collection Scheme in Wireless Sensor Networks by Guorui Li, Jingsha He, Cong Wang

    Published 2015-01-01
    “…We propose a three-phase top- k query based distributed data collection scheme which is designed for clustered or multisink wireless sensor networks. The proposed scheme consists of a distributed iterative hard thresholding algorithm and a three-phase top- k query algorithm. …”
    Get full text
    Article