-
221
Charging path optimization in mobile wireless rechargeable sensor networks
Published 2023-12-01Subjects: “…mobile wireless network…”
Get full text
Article -
222
Target Tracking with NLOS Detection and Mitigation in Wireless Sensor Networks
Published 2013-11-01Get full text
Article -
223
Detecting and Defending against Replication Attacks in Wireless Sensor Networks
Published 2013-06-01“…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. …”
Get full text
Article -
224
Open-Source Telemedicine Platform for Wireless Medical Video Communication
Published 2013-01-01“…An m-health system for real-time wireless communication of medical video based on open-source software is presented. …”
Get full text
Article -
225
Efficiency centric reliable communication mechanism for wireless sensor networks
Published 2008-01-01“…Reliable transfer mechanism was needed for wireless sensor network’s communication link to ensure end-to-end reliability. …”
Get full text
Article -
226
Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-03-01Subjects: Get full text
Article -
227
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01“…To collect the data and transmit them on the base station is the main task of the sensor nodes in wireless sensor networks (WSNs). This transmission requires a specific routing algorithm. …”
Get full text
Article -
228
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
Published 2011-10-01“…In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyber-physical systems. …”
Get full text
Article -
229
Dynamic Resource Management in 802.11 Wireless Mesh Networks
Published 2012-01-01“…The association/handoff procedures are important components in a balanced operation of 802.11-based wireless mesh networks. In this paper, we introduce the concept of cooperative association where the stations (STA) can share useful information in order to improve the performance of the association/reassociation procedures. …”
Get full text
Article -
230
Intrusion Detection Systems in Wireless Sensor Networks: A Review
Published 2013-05-01“…Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. …”
Get full text
Article -
231
Energy-Efficient Wireless Communications with Future Networks and Diverse Devices
Published 2013-01-01Get full text
Article -
232
A Novel Location Management Scheme for Wireless Mesh Networks
Published 2009-01-01Get full text
Article -
233
An Innovative Linear Wireless Sensor Network Reliability Evaluation Algorithm
Published 2025-01-01“…In recent years, wireless sensor networks (WSNs) have become a crucial technology for infrastructure monitoring. …”
Get full text
Article -
234
Analysis of Effective Operation Performance of Wireless Control Downhole Choke
Published 2020-01-01“…Wireless control downhole throttle is designed to control the opening of downhole throttle remotely by ground pressure wave signal to regulate downhole production in a wireless and intelligent manner. …”
Get full text
Article -
235
Network slicing scheme for heterogeneous power wireless communication networks
Published 2020-02-01“…Targeted at power communication networks,the concepts of vertical and horizontal slicing was introduced,the slicing enabler technologies,then explain the technial challenges of realizing network slicing in power communication networks,finally a slicing scheme for heterogeneous power wireless communication networks was proposed in which vertical slicing guarantees specific applications’ quality and horizontal slicing improves efficiency and flexibility of system entities and terminal devices.…”
Get full text
Article -
236
A Comprehensive Exploration of 6G Wireless Communication Technologies
Published 2025-01-01Subjects: “…6G wireless communication…”
Get full text
Article -
237
An Improved 3D Localization Algorithm for the Wireless Sensor Network
Published 2015-06-01“…Location information is crucial in the wireless sensor network. The nodes in wireless sensor networks are often deployed in the three-dimensional scenario. …”
Get full text
Article -
238
Research on Lifetime Optimization Algorithm for Mobile Wireless Sensor Network
Published 2013-10-01Subjects: “…mobile wireless sensor network…”
Get full text
Article -
239
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01“…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
Get full text
Article -
240
Security mechanisms and data access protocols in innovative wireless networks
Published 2018-09-01Get full text
Article