Showing 761 - 780 results of 8,265 for search '"mobilization"', query time: 0.07s Refine Results
  1. 761
  2. 762

    Multi-channel based on power control protocol for mobile ad hoc networks by LI Dong-sheng, XIANG Yong, SHI Mei-lin

    Published 2006-01-01
    “…To solve the collision problem brought by power control in mobile ad-hoc network(MANET),multi-channel MAC protocol and on-demand minimum energy routing protocol were employed,to carry out a multi-channel based power control ad hoc network,MCBPC.This architecture controlled the frequent changes of topology,decreased the probability of contact brought by power control,and achieved the goal of energy conservation.Simulation results indicate that compared with AODV@IEEE 802.11 approaches,the proposed MCBPC solution achieves about 90% increase in the throughput and network lifetime,and 30% increase in the packet delivery ratio.…”
    Get full text
    Article
  3. 763

    Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks by Yang Yang, Xiaoyu Jin, Su Yao, Xuesong Qiu, Liu Liu

    Published 2017-06-01
    “…Mobile agent is a kind of program which can transfer via asynchronous mode independently in the sensor network with outstanding prospects in application. …”
    Get full text
    Article
  4. 764
  5. 765
  6. 766

    MIMO Channel Model with Propagation Mechanism and the Properties of Correlation and Eigenvalue in Mobile Environments by Yuuki Kanemiyo, Youhei Tsukamoto, Hiroaki Nakabayashi, Shigeru Kozono

    Published 2012-01-01
    “…Moreover, as the path moves into LOS, the 𝜆1 state with mobile movement becomes more stable than the 𝜆1 of NLOS path.…”
    Get full text
    Article
  7. 767

    The User Participation Incentive Mechanism of Mobile Crowdsensing Network Based on User Threshold by Hua Su, Qianqian Wu, Xuemei Sun, Ning Zhang

    Published 2020-01-01
    “…Mobile crowdsensing (MCS) network means completing large-scale and complex sensing tasks in virtue of the mobile devices of ordinary users. …”
    Get full text
    Article
  8. 768

    Experimental Study on the Compressive Strength of Big Mobility Concrete with Nondestructive Testing Method by Huai-Shuai Shang, Ting-Hua Yi, Lu-Sheng Yang

    Published 2012-01-01
    “…An experimental study of C20, C25, C30, C40, and C50 big mobility concrete cubes that came from laboratory and construction site was completed. …”
    Get full text
    Article
  9. 769
  10. 770
  11. 771

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article
  12. 772
  13. 773

    Mobile Sleep Lab: Comparison of polysomnographic parameters with a conventional sleep laboratory. by Chihiro Suzuki, Yoko Suzuki, Takashi Abe, Takashi Kanbayashi, Shoji Fukusumi, Toshio Kokubo, Isamu Takahara, Masashi Yanagisawa

    Published 2025-01-01
    “…We, therefore, developed a Mobile Sleep Lab in a bus powered by fuel cells with two sleep measurement chambers. …”
    Get full text
    Article
  14. 774
  15. 775
  16. 776
  17. 777

    Privacy-preserving attribute ticket scheme based on mobile terminal with smart card by Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG

    Published 2022-10-01
    “…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
    Get full text
    Article
  18. 778
  19. 779
  20. 780