-
2121
Remote Industrial Sensor Network Monitoring Using M2M Based Ethical Sniffers
Published 2012-11-01“…Diagnosing the deployed network efficiency and anomaly detection, which is an important research issue in traditional networking systems, has not been carefully addressed in industrial wireless sensor networks. Although recent wireless systems for industrial automation such as ISA100.11a employ device management protocols, these protocols generate and report a large amount of status information from individual sensor nodes. …”
Get full text
Article -
2122
Localization of multiple jamming attackers in vehicular ad hoc network
Published 2017-08-01“…In vehicular ad hoc network, wireless jamming attacks are easy to be launched in the control channel and can cause serious influence on the network performance which may cause further safety accidents. …”
Get full text
Article -
2123
Assessing the Antenna Performance (Radiated Power) and Electromagnetic Impact (SAR) on a User of a Wearable RF Communication Device, Involving Variously Structured Models
Published 2025-01-01“…The investigations focused on the significance of the structural design of models of a wearable device equipped with a wireless radiofrequency communication module (W-RFCD) operating at 2.45 GHz. …”
Get full text
Article -
2124
Unsupervised and Semisupervised Machine Learning Frameworks for Multiclass Tool Wear Recognition
Published 2024-01-01Get full text
Article -
2125
Outage and Throughput Analysis of Cooperative Non-Orthogonal Multiple Access based SWIPT Cognitive Relay Network
Published 2025-01-01“…This paper examines the performance of a half-duplex wireless sensor network (WSN) by using cooperative non-orthogonal multiple access (NOMA) integrated with simultaneous wireless information and power transfer (SWIPT) over Rayleigh fading channel to improve the performance of far and cognitive users in terms of spectrum efficiency, prolonging the coverage area, and network lifetime. …”
Get full text
Article -
2126
Dual Polarized Dual Fed Vivaldi Antenna for Cellular Base Station Operating at 1.7–2.7 GHz
Published 2017-01-01Get full text
Article -
2127
On the MIMO Capacity for Distributed System under Composite Rayleigh/Rician Fading and Shadowing
Published 2015-01-01“…Wireless channels are commonly affected by short-term fading and long-term fading (shadowing). …”
Get full text
Article -
2128
Effects of Age and Gender on Hand Motion Tasks
Published 2015-01-01“…Objective. Wearable and wireless motion sensor devices have facilitated the automated computation of speed, amplitude, and rhythm of hand motion tasks. …”
Get full text
Article -
2129
Highly selective-notch band ultrawide band antenna: A review
Published 2025-01-01“…The ever-growing demand for antennas in wireless communications has challenged researchers to design antennas with innovations for highly efficient communications between end users. …”
Get full text
Article -
2130
Low-Profile Dual-Wideband MIMO Antenna with Low ECC for LTE and Wi-Fi Applications
Published 2014-01-01“…This paper presents a low-profile dual-wideband multiple input multiple output (MIMO) antenna with low envelop correlation coefficient (ECC) for long-term evolution (LTE) and wireless fidelity (Wi-Fi) applications. The antenna covers LTE band 7 and Wi-Fi as well as wireless broadband (Wibro) and Worldwide Interoperability for Microwave Access (WiMax) (except for the 3.5-GHz band). …”
Get full text
Article -
2131
Nonlinear time series prediction algorithm based on AD-SSNET for artificial intelligence–powered Internet of Things
Published 2021-03-01“…Time series have broad usage in the wireless Internet of Things. This article proposes a nonlinear time series prediction algorithm based on the Small-World Scale-Free Network after the AIC-Optimized Subtractive Clustering Algorithm (AIC-DSCA-SSNET, AD-SSNET) to predict the nonlinear and unstable time series, which improves the prediction accuracy. …”
Get full text
Article -
2132
Learning-based DoS attack game strategy over multi-process systems
Published 2024-12-01“…In cyber-physical systems, the state information from multiple processes is sent simultaneously to remote estimators through wireless channels. However, with the introduction of open media such as wireless networks, cyber-physical systems may become vulnerable to denial-of-service attacks, which can pose significant security risks and challenges to the systems. …”
Get full text
Article -
2133
Evaluating basic chest pass skills in the 21st century using chest pass automatic board 2.0
Published 2025-01-01“…Objective: The product refines the previous version of the automatic chest pass board by adding a feature for automatic result calculation and utilizing wireless technology. Methodology: This study utilized the research and development approach. …”
Get full text
Article -
2134
An Experimental Study of WSN Power Efficiency: MICAz Networks with XMesh
Published 2012-02-01“…This is an investigation of Wireless Sensor Networks (WSNs) using Memsic's XMesh routing protocol on MICAz wireless motes. …”
Get full text
Article -
2135
Effective rain rate model for analysing overestimated rain fade in short millimetre-wave terrestrial links due to distance factor
Published 2025-03-01“…The findings emphasize the importance of developing region-specific models that consider local meteorological variations, potentially offering significant improvements to the reliability and design of mm-wave communication systems and realizing the future goal of 6G wireless mobile fronthaul.…”
Get full text
Article -
2136
Novel Rake receiver structure for ultra wideband system based on antenna diversity
Published 2005-01-01“…A novel receiver structure for TH-UWB wireless communication system was proposed. The improved receiver, combining the antenna diversity with Rake receiver, could enhance the ability to suppress the multi-user interference and multipath fading. …”
Get full text
Article -
2137
Research on Manageable and Controllable Mobile VPDN Solution
Published 2013-04-01“…Mobile VPDN is also known as wireless IP private network or 3G IP private network.It offers data private network service based on 3G network to all enterprise customers.Key factors of mobile VPDN,such as flexible network building,the policies of security authentication and service guarantee,were analyzed.A security-enhanced model and a controllable networking solution were introduced.…”
Get full text
Article -
2138
Survey on available bandwidth estimation in ad hoc network
Published 2010-01-01“…With analysis of the difference between bandwidth estimation scheme in wired network and wireless network,the available bandwidth in mobile ad hoc network is defined. …”
Get full text
Article -
2139
5G scale networking strategy and network construction solution
Published 2019-06-01“…Three telecom operators in China have issued the frequency bands of 5G trial network,the 5G operation license will be released soon,and the trial scale networking will be launched.The overall deployment strategy of 5G trial networking was expounded,and the network construction ideas and solutions of different professions were elaborated from the aspects of wireless network,bearer network and core network respectively.…”
Get full text
Article -
2140
Research on estimating effective order of radio channel in OFDM systems
Published 2006-01-01“…In wireless communication system based on OFDM,the character of LS algorithm’s result in time-domain was paid much attention to.At the same time,the character of Channel Impulse Response(CIR)in time-domain was taken into account.It was proposed to detect energy of CIR’s tap of LS algorithm’s result in time-domain and search the effective order of radio channel conversely.By theoretical analyses and computer simulation,it is indicated that this method shows good performance in estimating effective order of radio channel.…”
Get full text
Article