-
561
Communication between nodes in backscatter-assisted wireless powered communication network
Published 2021-06-01Subjects: “…wireless powered communication network…”
Get full text
Article -
562
Link optimization strategy based on spectral moment in wireless sensor network
Published 2017-11-01Subjects: “…wireless sensor network…”
Get full text
Article -
563
Implementation on Evolved Packet Core and Wireless Network End-to-End Tracing
Published 2014-12-01“…In the 4G network, because the flat network structure, wireless access side cannot independently to realize the analysis of user tracking and optimization. …”
Get full text
Article -
564
Wireless Quick Connection Technology for Smart Home Devices in Home Network
Published 2015-11-01Subjects: Get full text
Article -
565
Distributed algorithms for cooperative routing and power allocation in wireless sensor networks
Published 2008-01-01Subjects: Get full text
Article -
566
Data Gathering Schedule for Minimal Aggregation Time in Wireless Sensor Networks
Published 2009-01-01Get full text
Article -
567
A Photothermal Modelling Approach for Micro-LED Arrays in Wireless Optogenetics
Published 2024-01-01“…The physical model can effectively guide the wireless optogenetic hardware circuits to perform effective stimulation within a controlled temperature range. …”
Get full text
Article -
568
Communication performance analysis of wireless sensor network for railway environmental monitoring
Published 2019-05-01Subjects: Get full text
Article -
569
Connectivity analysis of passive cluster with high stability in vehicular wireless network
Published 2016-11-01Subjects: Get full text
Article -
570
Layer-Based Data Aggregation and Performance Analysis in Wireless Sensor Networks
Published 2013-01-01“…Due to the similarity and correlation among sensed data in wireless sensor network, it is an important way to reduce the number of packets transmitted with data aggregation technology so as to prolong the network lifetime. …”
Get full text
Article -
571
Wirelessly Pattern Reconfigurable Yagi Antenna Based on Radio Frequency Identification
Published 2024-01-01“…The proposed scheme emphasizes the use of wireless communication instead of long metal cables, resulting in improved stability of the antenna’s pattern and return loss. …”
Get full text
Article -
572
Integrated algorithm based on vectors in node localization for wireless sensor networks
Published 2008-01-01Subjects: “…wireless sensor networks…”
Get full text
Article -
573
Remote Interoperability Testing Client for Wireless Personal Area Network Protocol
Published 2015-11-01“…When the entities in one interoperability testing case were not suitable to be placed in the same physical location,the remote testing method was needed to complete the testing.In order to guarantee the success of the remote testing,a platform based on the Internet environment was built.A system structure was designed for assure the platform was suitable for wireless personal area network protocol.The framework mainly contained the device connection module and the data forwarding module.To illustrate the application of proposed approach,a real case study was proposed:the 6LoWPANs protocol.The results of the experimentation performed on this protocol were also presented.…”
Get full text
Article -
574
Malicious attack-resistant secure localization algorithm for wireless sensor network
Published 2016-12-01Subjects: “…wireless sensor network…”
Get full text
Article -
575
Multi-hop wireless network oriented multiple jammers localization algorithm
Published 2016-12-01Subjects: “…multi-hop wireless network…”
Get full text
Article -
576
Novel Directional Nanoantennas for Single-Emitter Sources and Wireless Nano-Links
Published 2012-01-01Get full text
Article -
577
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Published 2015-09-01“…For network users roaming in a wireless sensor network (WSN), they can broadcast queries to WSNs to obtain the latest sensed data from sensor nodes using their mobile devices. …”
Get full text
Article -
578
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01“…Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced .…”
Get full text
Article -
579
Threshold Accepting Heuristic for Fair Flow Optimization in Wireless Mesh Networks
Published 2014-01-01“…In this paper we show the results of the threshold accepting procedure applied to extremely difficult problem of fair resource allocation in wireless mesh networks (WMN). The fairness is modeled by allowing preferences with regard to distribution of Internet traffic between network participants. …”
Get full text
Article -
580
A distributed data secure transmission scheme in wireless sensor network
Published 2017-04-01“…Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. Multi-hop transmission of data between sensor nodes wastes network resource. …”
Get full text
Article