-
381
Modeling of the 2.4 GHz wireless channel path loss in substation
Published 2016-07-01Subjects: “…short distance wireless communication…”
Get full text
Article -
382
Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks
Published 2017-01-01“…Privacy-preserving in wireless sensor networks is one of the key problems to be solved in practical applications. …”
Get full text
Article -
383
Wireless Multi-Coil Transmission With a Rotating Part of the Internal Winding
Published 2025-01-01Subjects: Get full text
Article -
384
Energy-saving Electromagnetic Valve Wireless Control System in Agricultural Irrigation
Published 2009-01-01Get full text
Article -
385
Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering
Published 2014-04-01Get full text
Article -
386
Environment Parameters Control Based on Wireless Sensor Network in Livestock Buildings
Published 2016-05-01“…A monitoring and control method of environment parameters in livestock buildings based on wireless sensor network is proposed in this paper. …”
Get full text
Article -
387
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01“…In order to solve the problem of hidden key leakage in traditional high-level message authentication and passive eavesdropping in physical layer message authentication,a message encryption and authentication mechanism based on the characteristics of wireless physical layer was proposed.By extracting the characteristics of the wireless channel,the physical layer key was generated and the seed key was generated by combining the identity key.The key stream generator then generated the key stream to decrypt the message according to the extracted seed,protects the privacy of the transmitted data,and the final receiver authenticated the authenticity and integrity of the received message through the CRC verification result.Simulation results show that the proposed method has better performance in preventing passive eavesdropping and active attack,and the randomness of key stream is greatly improved and the rate of authentication leak detection is reduced by half.…”
Get full text
Article -
388
Ternary polynomial based key management scheme for wireless sensor network
Published 2013-12-01Subjects: “…wireless sensor network…”
Get full text
Article -
389
Dependable-cooperative channel resource allocation scheme in wireless mesh network
Published 2017-05-01Subjects: “…wireless mesh network…”
Get full text
Article -
390
Time Synchronization for Wireless Sensor Networks Using Adaptive Linear Prediction
Published 2015-10-01“…Time synchronization is a crucial component in wireless sensor networks (WSN), especially for location-aware applications. …”
Get full text
Article -
391
Overlay multicast strategy based on utility optimization for wireless mesh networks
Published 2008-01-01Subjects: “…wireless mesh networks…”
Get full text
Article -
392
Ingestible Wireless Capsule Technology: A Review of Development and Future Indication
Published 2012-01-01“…Ingestible wireless capsule endoscopy (WCE) is the one and only painless, effective, novel, diagnostic technology for inspecting the entire gastrointestinal (GI) tract for various diseases, such as obscure gastrointestinal bleeding (OGIB), tumors, cancer, Crohn’s disease, and celiac disease. …”
Get full text
Article -
393
Non-orthogonal multiple access wireless energy harvesting cooperative system
Published 2021-04-01“…Non-orthogonal multiple access (NOMA) has recently attracted wide attention as a promising multiple access technology adopted in 5G cellular networks.In order to improve the spectrum efficiency, coverage and anti-noise performance of NOMA technology, while reduce the energy consumption of the system, a simultaneous wireless information and power transfer (SWIPT) cooperative network uplink NOMA transmission system based on orthogonal index modulation multiple access (IMMA) technology was designed, hereafter was denoted as QIMMA-SWIPT.Specifically, the QIMMA system was formed by multiple remote users, and it improved the spectrum efficiency and anti-noise performance as well as expanded the communication coverage and reduced the energy consumption of the system by decoding and forwarding relay cooperative transmission with SWIPT technology.The theoretical upper bound of the average bit error rate of QIMMA-SWIPT was derived.Simulation and analysis demonstrate that, under the same spectrum efficiency, the bit error rate performance of the cooperative QIMMA-SWIPT system is better than that of the cooperative IMMA-SWIPT and SCMA-SWIPT systems.In addition, the effects of power cut factor and source-to-relay distance on bit error performance were also deeply analyzed.…”
Get full text
Article -
394
Eenergy effiency access strategy:towards hybrid wireless sensor network
Published 2013-09-01Subjects: “…wireless sensor network…”
Get full text
Article -
395
BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks
Published 2013-03-01“…Localization is the key supporting technology for wireless sensor networks (WSNs). Security and accuracy are the premise of the localization application. …”
Get full text
Article -
396
Robust Maximum Lifetime Routing and Energy Allocation in Wireless Sensor Networks
Published 2012-08-01“…We consider the maximum lifetime routing problem in wireless sensor networks in two settings: (a) when nodes’ initial energy is given and (b) when it is subject to optimization. …”
Get full text
Article -
397
A Software-Defined Radio System for Intravehicular Wireless Sensor Networks
Published 2010-01-01“…An intra-vehicular wireless sensor network is designed and implemented on a software-defined radio system. …”
Get full text
Article -
398
Decentralized Kalman Filtering with Multilevel Quantized Innovation in Wireless Sensor Networks
Published 2015-07-01“…Because of low power consumption and limited power supply significance in wireless sensor networks (WSNs), this paper studies the multilevel quantized innovation Kalman filtering (MQI-KF) for decentralized state estimation in WSNs since the MQI-KF can help to save power. …”
Get full text
Article -
399
Efficient and reliable packet transfer protocol for wireless multihop bidirectional communications
Published 2018-01-01“…In wireless multihop bidirectional communication environment, there is a possibility that packet collision and retransmission owing to the hidden node problem decrease efficiency of throughput. …”
Get full text
Article -
400
Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks
Published 2013-09-01“…This work provides a distributed fault-tolerant event region detection algorithm for wireless sensor networks. The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. …”
Get full text
Article