Showing 181 - 200 results of 3,139 for search '"wireless"', query time: 0.07s Refine Results
  1. 181

    Real-Time Communications in Large-Scale Wireless Networks by Liang Song, Dimitrios Hatzinakos

    Published 2008-01-01
    “…There is an emerging need for realizing real-time quality of service (QoS) over multihop wireless communications in large-scale wireless networks. …”
    Get full text
    Article
  2. 182
  3. 183

    Multilayer Orthogonal Beamforming for Priority-Guaranteed Wireless Communications by Jindong Xie, Jun Zhang, Lin Bai

    Published 2012-08-01
    “…To utilize the benefits of cellular systems, wireless machine-to-machine (M2M) communications over cellular systems are being widely considered. …”
    Get full text
    Article
  4. 184

    Self-adaptive fair scheduling algorithm in wireless network by Lu YANG, Qing-liang WU

    Published 2012-01-01
    “…The fair scheduling model in wireless/mobile environment was studied,The necessity of DiffServe and compensatory scheduling mechanism was chorused,a two-level wireless fair scheduling algorithm (TWFS) which differentiates service types and allocates network resources fairly was devised.As for the contemporary service intermittence due to link failure,service compensations was made at link leve and packet level.The packet level fair resource allocation ensured the graceful degradation of service quality.…”
    Get full text
    Article
  5. 185
  6. 186

    Research on Wireless Relay Application in TD-LTE Network by Jiangbo Dong, Wei Liu, Yunbo Han, Hao Sun, Yanlei Chen, Nan Li

    Published 2015-05-01
    “…Wireless relay can solve the problems of covering blind spots,which was caused by lack of cable transmission,difficult at station site property coordination of macro base station,high-rise block. …”
    Get full text
    Article
  7. 187
  8. 188

    Hierarchical Spatial Clustering in Multihop Wireless Sensor Networks by Zhidan Liu, Wei Xing, Yongchao Wang, Dongming Lu

    Published 2013-11-01
    “…Wireless sensor networks have been widely deployed for environment monitoring. …”
    Get full text
    Article
  9. 189
  10. 190

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
    Get full text
    Article
  11. 191
  12. 192
  13. 193
  14. 194
  15. 195
  16. 196

    Research on the big data planning model of mobile wireless network by Yu CHEN, Xiaodong CHEN, Yue LIU

    Published 2019-12-01
    Subjects: “…mobile wireless network…”
    Get full text
    Article
  17. 197

    Reliability analysis of wireless communication equipment based on model selection by SUN Jin, HU Jicheng, JIAO Yaqi, WANG Kun

    Published 2025-02-01
    “…In view of the complex structure and failure mechanism of wireless communication equipment, numerous failure distribution types, difficulty in selecting and evaluating reliability models and other problems, this paper starts from the research on equipment failure distribution at the bottom level, takes typical wireless communication system vehicle self-organizing network equipment as the research object, and compares and analyzes the correlation coefficients and error values of equipment life exponential distribution, lognormal distribution and two-parameter Weibull distribution. …”
    Get full text
    Article
  18. 198

    Research on interference avoidance detection method for wireless access system by Jian GONG, Xu SHI, Qiaochun XU

    Published 2024-02-01
    “…The types of interference avoidance mechanisms adopted by wireless access systems to realize spectrum sharing and compatibility were introduced, and the specific detection methods such as channel occupancy time, idle channel evaluation, idle channel evaluation time cumulative probability distribution statistics, determination of interference signal detection threshold, silent period duration and equivalent utility were explained.The problems in the actual device detection system were highlighted, and new effective channel occupancy time and idle channel evaluation algorithms and the determination process were given.…”
    Get full text
    Article
  19. 199

    Security flaws and improvement to a wireless authentication protocol with anonymity by PENG Hua-xi, FENG Deng-guo

    Published 2006-01-01
    “…The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. …”
    Get full text
    Article
  20. 200

    QoS-based sensing scheduling protocol for wireless sensor networks by YAO Dao-yuan1, WANG Hai-lin 1, ZHANG Bao-xian2, LIU Hai-tao1

    Published 2010-01-01
    “…To satisfy the requirements of event detected latency according to different applications with unbalanced node density in randomly deployed large-scale wireless sensor networks,an adaptive distributed sensing scheduling protocol(ADSSP) which adaptively adjusts the duty cycles of sensor nodes based on node density and balances the energy consumption among sensor nodes was proposed.Compared with the random scheduling protocol,ADSSP can provide guaranteed lower average detection latency and also prolong the network lifetime up to 30 percent under the same situation.…”
    Get full text
    Article