Showing 221 - 240 results of 3,139 for search '"wireless"', query time: 0.06s Refine Results
  1. 221
  2. 222
  3. 223

    Detecting and Defending against Replication Attacks in Wireless Sensor Networks by Xiang-yi Chen, Li-xia Meng, Yong-zhao Zhan

    Published 2013-06-01
    “…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. …”
    Get full text
    Article
  4. 224

    Open-Source Telemedicine Platform for Wireless Medical Video Communication by A. Panayides, I. Eleftheriou, M. Pantziaris

    Published 2013-01-01
    “…An m-health system for real-time wireless communication of medical video based on open-source software is presented. …”
    Get full text
    Article
  5. 225

    Efficiency centric reliable communication mechanism for wireless sensor networks by ZHANG Xi-yuan1, ZHAO Hai1, SUN Pei-gang1, XU Jiu-qiang1, ZHU Jian1

    Published 2008-01-01
    “…Reliable transfer mechanism was needed for wireless sensor network’s communication link to ensure end-to-end reliability. …”
    Get full text
    Article
  6. 226
  7. 227

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To collect the data and transmit them on the base station is the main task of the sensor nodes in wireless sensor networks (WSNs). This transmission requires a specific routing algorithm. …”
    Get full text
    Article
  8. 228

    Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks by Tamás Holczer, Levente Buttyán

    Published 2011-10-01
    “…In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyber-physical systems. …”
    Get full text
    Article
  9. 229

    Dynamic Resource Management in 802.11 Wireless Mesh Networks by George Athanasiou

    Published 2012-01-01
    “…The association/handoff procedures are important components in a balanced operation of 802.11-based wireless mesh networks. In this paper, we introduce the concept of cooperative association where the stations (STA) can share useful information in order to improve the performance of the association/reassociation procedures. …”
    Get full text
    Article
  10. 230

    Intrusion Detection Systems in Wireless Sensor Networks: A Review by Nabil Ali Alrajeh, S. Khan, Bilal Shams

    Published 2013-05-01
    “…Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. …”
    Get full text
    Article
  11. 231
  12. 232
  13. 233

    An Innovative Linear Wireless Sensor Network Reliability Evaluation Algorithm by Tao Ma, Huidong Guo, Xin Li

    Published 2025-01-01
    “…In recent years, wireless sensor networks (WSNs) have become a crucial technology for infrastructure monitoring. …”
    Get full text
    Article
  14. 234

    Analysis of Effective Operation Performance of Wireless Control Downhole Choke by Yukun Fu, Huiyun Ma, Chenggang Yu, Liangliang Dong, Yunshan Yang, Xiaohua Zhu, Hanwen Sun

    Published 2020-01-01
    “…Wireless control downhole throttle is designed to control the opening of downhole throttle remotely by ground pressure wave signal to regulate downhole production in a wireless and intelligent manner. …”
    Get full text
    Article
  15. 235

    Network slicing scheme for heterogeneous power wireless communication networks by Yan ZHEN, Mengyue YU, Haibo ZHAO

    Published 2020-02-01
    “…Targeted at power communication networks,the concepts of vertical and horizontal slicing was introduced,the slicing enabler technologies,then explain the technial challenges of realizing network slicing in power communication networks,finally a slicing scheme for heterogeneous power wireless communication networks was proposed in which vertical slicing guarantees specific applications’ quality and horizontal slicing improves efficiency and flexibility of system entities and terminal devices.…”
    Get full text
    Article
  16. 236
  17. 237

    An Improved 3D Localization Algorithm for the Wireless Sensor Network by Yan Xu, Yi Zhuang, Jing-jing Gu

    Published 2015-06-01
    “…Location information is crucial in the wireless sensor network. The nodes in wireless sensor networks are often deployed in the three-dimensional scenario. …”
    Get full text
    Article
  18. 238
  19. 239

    Identity-based roaming protocol with anonymity for heterogeneous wireless networks by JIANG Qi1, MA Jian-feng1, LI Guang-song1, LIU Hong-yue1

    Published 2010-01-01
    “…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
    Get full text
    Article
  20. 240