Showing 2,061 - 2,080 results of 3,139 for search '"wireless"', query time: 0.05s Refine Results
  1. 2061
  2. 2062

    UAV selection for high-speed train communication using OTFS modulation by Ehab Mahmoud Mohamed, Sherief Hashima

    Published 2025-01-01
    “…Abstract Providing continuous wireless connectivity for high-speed trains (HSTs) is challenging due to their high speeds, making installing numerous ground base stations (BSs) along the HST route an expensive solution, particularly in rural and wilderness areas. …”
    Get full text
    Article
  3. 2063

    A Codesigned Compact Dual-Band Filtering Antenna with PIN Loaded for WLAN Applications by Shanxiong Chen, Yu Zhao, Maoling Peng, Yunji Wang

    Published 2014-01-01
    “…A codesigned compact dual-band filtering antenna incorporating a PIN diode for 2.45/5.2 GHz wireless local area network (WLAN) applications is proposed in this paper. …”
    Get full text
    Article
  4. 2064

    Energy Harvesting from the Stray Electromagnetic Field around the Electrical Power Cable for Smart Grid Applications by Farid Ullah Khan

    Published 2016-01-01
    “…For wireless sensor node (WSN) applications, this paper presents the harvesting of energy from the stray electromagnetic field around an electrical power line. …”
    Get full text
    Article
  5. 2065

    Flexible terahertz beam manipulation and convolution operations in light-controllable digital coding metasurfaces by Min Jia, Chao Zhao, Hui Wang, Weiran Sun, Yuncheng Lu

    Published 2025-02-01
    “…In this work, we design and implement a wireless optically controlled tunable coding metasurface by integrating photosensitive silicon into the metasurface, which realizes the ultra-fast dynamic switching effect of terahertz beam and dynamic convolution operation of 2-bit coding metasurface. …”
    Get full text
    Article
  6. 2066

    Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments by Abdallah Farraj, Eman Hammad

    Published 2024-12-01
    “…Specifically, an IoT device communicating over an insecure wireless channel will utilize intentional noise signals transmitted alongside the actual IoT information signal. …”
    Get full text
    Article
  7. 2067

    Analysis of high-rise building safety detection methods based on big data and artificial intelligence by Jiaojiao Xu, Chuanjie Yan, Yangyang Su, Yong Liu

    Published 2020-06-01
    “…The experimental data show that wireless sensor technology is applied to the inclination monitoring of buildings, and a monitoring system based on wireless inclination sensors is designed to enable real-time dynamic monitoring of buildings to ensure human safety. …”
    Get full text
    Article
  8. 2068

    A Novel Dual-Band “C+O” Structure Antenna by Tangyao Xie, Jianguo Yu, Ziheng Lin, Yao Li, Guodong Zhang, Zhen Yu

    Published 2021-01-01
    “…The antenna is suitable for wireless applications such as second generation (2G), third generation (3G), fourth generation (4G), WLAN, and Bluetooth. …”
    Get full text
    Article
  9. 2069

    Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network by Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, Jun Song

    Published 2015-01-01
    “…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
    Get full text
    Article
  10. 2070

    Protecting H.264/AVC Data-Partitioned Video Streams over Broadband WiMAX by Laith Al-Jobouri, Martin Fleury, Mohammed Ghanbari

    Published 2012-01-01
    “…Broadband wireless technology, though aimed at video services, also poses a potential threat to video services, as wireless channels are prone to error bursts. …”
    Get full text
    Article
  11. 2071

    Novel MAC Protocol and Middleware Designs for Wearable Sensor-Based Systems for Health Monitoring by Kyeong Hur, Won-Sung Sohn, Jae-Kyung Kim, YangSun Lee

    Published 2013-04-01
    “…We propose a middleware platform built on wireless USB (WUSB) over wireless body area networks (WBAN) hierarchical protocol for wearable health-monitoring systems (WHMS). …”
    Get full text
    Article
  12. 2072

    Implementing PMIPv6 Protocol Based on Extended Service Set for IEEE 802.11 Infrastructure WLAN by Deqing Zhu, Lin Xu, Yi-hua Zhu, Xianzhong Tian

    Published 2015-08-01
    “…With the popularity of IEEE 802.11 based wireless fidelity (Wi-Fi) portable devices, it becomes increasingly significant to support the mobile users carrying Wi-Fi devices to access the Internet of Things (IoT) so that the communications between the mobile users and the smart objects deployed in the IoT stay uninterrupted when the mobile users are in movement. …”
    Get full text
    Article
  13. 2073
  14. 2074

    Design of UWB Filter with WLAN Notch by Harish Kumar, MD. Upadhayay

    Published 2012-01-01
    “…UWB filter with wireless local area network (WLAN) notch at 5.6 GHz and 3 dB fractional bandwidth of 109.5% using a microstrip structure is presented. …”
    Get full text
    Article
  15. 2075

    Spatial Domain Resource Sharing for Overlapping Cells in Indoor Environment by Riichi Kudo, Yasushi Takatori, Kentaro Nishimori, Takeo Ichikawa, Tomoki Murakami, Masato Mizoguchi, Masahiro Morikura

    Published 2010-01-01
    “…As microcell wireless systems become more widespread, intercell interference among the access points will increase due to the limited frequency resource. …”
    Get full text
    Article
  16. 2076

    Beyond Single-User Scheduling: Exploiting Massive MIMO for Concurrent Data Delivery With Minimum Age of Information by Muhammad Fahad Ijaz, Umar Rashid, Omer Waqar

    Published 2025-01-01
    “…With the emergence of real-time applications, modern wireless networks have witnessed the use of Age of Information (AoI) as a critical metric for evaluating the timeliness of data delivery. …”
    Get full text
    Article
  17. 2077
  18. 2078

    Analysis of Radio Resource Schedule in LTE eMBMS by Feng Zhou, Hui Liu

    Published 2014-12-01
    “…The LTE service eMBMS was focused on, including the architecture and advantages. Furthermore, the wireless technologies and radio resource schedule were discussed and analyzed.…”
    Get full text
    Article
  19. 2079

    Throughout Maximization for IRS-Assisted WPCN With Hybrid TDMA-NOMA Scheme by Yizheng Ma, Ruoyi Wu, Yi Zhang, Yupeng Shang, Linzhen Zhu

    Published 2025-01-01
    “…These devices firstly collect energy in a non-linear manner disseminated by a power station (PS) at downlink wireless energy transfer (WET) stage. The gathered energy is then utilized by these devices to convey data information to an access point (AP) by employing the TDMA protocol with flexible time slots at the uplink wireless information transfer (WIT) stage. …”
    Get full text
    Article
  20. 2080

    Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks by Madiha Khalid, Umar Mujahid, Muhammad Najam-ul-Islam

    Published 2018-08-01
    “…Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. …”
    Get full text
    Article