-
61
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
Published 2013-05-01“…Wireless sensor networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. …”
Get full text
Article -
62
PERFORMANCE OF WIRELESS MEASUREMENT SYSTEM FOR SOIL PROPERTIES MONITORING
Published 2018-06-01“… A developed wireless microprocessor system based on ATmega328P microcontroller and Arduino sensors for measurement of soil properties is described in the paper. …”
Get full text
Article -
63
Addressing Mobility in Wireless Sensor Media Access Protocol
Published 2005-01-01Get full text
Article -
64
A Mac Protocol Implementation for Wireless Sensor Network
Published 2015-01-01“…IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN). The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. …”
Get full text
Article -
65
Flexible and wireless metasurface coils for knee and elbow MRI
Published 2025-01-01“…In knee MRI, the MC + spine coil provided higher SNR compared to the flex coil, except posterior (superficial-anterior: +69%, p = 0.008; middle: +288%, p = 0.008; deep-posterior: −12%, p = 0.148) versus the knee coil, the MC + spine coil was superior in the middle but non-different in superficial pre-patellar areas and less in deep-posterior areas (superficial-anterior: −8%, p = 0.188; middle: +44%, p = 0.008; deep-posterior: −36%, p = 0.016). Conclusion Wireless MCs exhibited great potential for knee and elbow MRI outperforming the flex coil. …”
Get full text
Article -
66
Application on Wireless Sensor Networks in Domestic and Hostile Environment
Published 2022-09-01Subjects: “…wireless sensor network…”
Get full text
Article -
67
Network Efficient Power Control for Wireless Communication Systems
Published 2014-01-01“…We introduce a two-loop power control that allows an efficient use of the overall power resources for commercial wireless networks based on cross-layer optimization. …”
Get full text
Article -
68
SensoTrust: Trustworthy Domains in Wireless Sensor Networks
Published 2015-07-01“…Wireless sensor networks (WSNs) based on wearable devices are being used in a growing variety of applications, many of them with strict privacy requirements: medical, surveillance, e-Health, and so forth. …”
Get full text
Article -
69
Path Loss Modeling of Wireless Signals in Underground Tunnels
Published 2025-01-01“…Typical features of underground tunnels (sidewall roughness, metal conductors, tunnel inclinations, etc.) significantly affect signal propagation, making it difficult for a single modeling approach to accurately describe the field strength attenuation of a wireless channel in an underground tunnel. In this paper, a hybrid model describing the propagation attenuation of wireless signals in underground tunnels is proposed, which divides the propagation channel into three subdomains according to the length of the tunnel, namely, the region of the free space propagation model, the region of the multimode propagation described by the ray tracing method, and the region of the improved waveguide model by adding the influences of tunnel roughness, tunnel inclination, and metal pipes. …”
Get full text
Article -
70
Effect of Environmental Parameters on the Performance of Optical Wireless Communications
Published 2019-01-01“…This paper studies the effect of environmental parameters like rain, fog, haze, snow, and dust on the performance of optical wireless communications using Opti-system program. …”
Get full text
Article -
71
Compressed Sensing Based Fingerprint Identification for Wireless Transmitters
Published 2014-01-01“…Therefore, this paper proposes a new method to identify different wireless transmitters based on compressed sensing. …”
Get full text
Article -
72
Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
Published 2014-10-01“…We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. …”
Get full text
Article -
73
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks
Published 2013-10-01“…Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. …”
Get full text
Article -
74
An Overview of Human Pose Estimation Based on Wireless Signals
Published 2025-02-01Subjects: Get full text
Article -
75
Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access
Published 2012-01-01“…We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power) individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI) of the other nodes' links in the considered network area. …”
Get full text
Article -
76
An Overlapping Clustering Approach for Routing in Wireless Sensor Networks
Published 2013-03-01“…The design and analysis of routing algorithm is an important issue in wireless sensor networks (WSNs). Most traditional geographical routing algorithms cannot achieve good performance in duty-cycled networks. …”
Get full text
Article -
77
Multiantenna Analog Network Coding for Multihop Wireless Networks
Published 2010-01-01Get full text
Article -
78
Cooperative Communications for Wireless Ad Hoc and Sensor Networks
Published 2013-01-01Get full text
Article -
79
Design of Optical Wireless Networks with Fair Traffic Flows
Published 2014-01-01“…The paper presents a method for optimising the wireless optical network that carries elastic packet traffic. …”
Get full text
Article -
80
PCA-Guided Routing Algorithm for Wireless Sensor Networks
Published 2012-01-01“…An important performance concern for wireless sensor networks (WSNs) is the total energy dissipated by all the nodes in the network over the course of network lifetime. …”
Get full text
Article