-
601
An estimated Hungarian method for data forwarding problem in underwater wireless sensor networks
Published 2018-05-01“…With the increasing concern over marine applications in recent years, the technology of underwater wireless sensor networks has received considerable attention. …”
Get full text
Article -
602
Research on intrusion detection algorithm in wireless network based on Bayes game model
Published 2010-01-01Subjects: “…wireless network…”
Get full text
Article -
603
Uplink scheduling scheme for cloud service based on software-defined wireless network
Published 2016-12-01Subjects: Get full text
Article -
604
A Dual-Cycle Architecture in Cognitive M2M Wireless Networks
Published 2013-11-01“…Dual-cycle cognitive model (DCCM) is an effective means to develop the future large-scale cognitive wireless networks. In this paper, the DCCM is considered to construct cognitive wireless netwroks, in which the structure and implementation of service-oriented radio architecture (SORA) are expounded. …”
Get full text
Article -
605
Integration and Analysis of Neighbor Discovery and Link Quality Estimation in Wireless Sensor Networks
Published 2014-01-01“…Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. …”
Get full text
Article -
606
Energy-Efficient Self-Organized Clustering with Splitting and Merging for Wireless Sensor Networks
Published 2013-03-01“…Energy efficiency is one of the most important issues for WSNs, because the battery of each wireless sensor node cannot be recharged or replaced. …”
Get full text
Article -
607
Scenario-adaptive wireless fall detection system based on few-shot learning
Published 2023-06-01“…A scenario robust fall detection system based on few-shot learning (FDFL) in wireless environment was designed.The performance of existing fall detection methods based on Wi-Fi channel state information (CSI) degrades significantly across scenarios, which requires collecting and marking a large number of CSI samples in each application scenario, resulting in high cost for large-scale deployment.Therefore, the method of few-shot learning was introduced, which can maintain the performance of fall detection with high accuracy when the number of annotated samples in unfa-miliar scenes is insufficient.The proposed FDFL was mainly divided into two stages, source domain meta-training and target domain meta-learning.The meta training stage of the source domain consists of two parts: data preprocessing and classification training.In the data preprocessing stage, the collected original CSI amplitude and phase data were denoised and segmented.In the classification training stage, a large number of processed source domain data samples were used to train a CSI feature extractor based on convolutional neural network.In the meta-learning stage of the target domain, the limited labeled data sampled in the target domain was effectively extracted based on the feature extractor trained in the meta-training module, and then a lightweight machine learning classifier was trained to detect the fall behavior under the cross-scene.Through several experiments in different scenarios, FDFL can achieve an average accuracy of 95.52% for the four classification tasks of falling, sitting, walking and sit down with only a small number of samples in the target domain, and maintain robust detection accuracy for changes in test environment, personnel target and equipment location.…”
Get full text
Article -
608
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: “…wireless sensor networks…”
Get full text
Article -
609
Block Least Mean Squares Algorithm over Distributed Wireless Sensor Network
Published 2012-01-01“…Both these conventional distributed algorithms involve significant communication overheads and, consequently, defeat the basic purpose of wireless sensor networks. In the present paper, we therefore propose two new distributed algorithms, namely, block diffusion least mean square (BDLMS) and block incremental least mean square (BILMS) by extending the concept of block adaptive filtering techniques to the distributed adaptation scenario. …”
Get full text
Article -
610
Geographical information based false report filtering scheme in wireless sensor networks
Published 2012-02-01Subjects: “…wireless sensor network…”
Get full text
Article -
611
Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks
Published 2014-08-01“…Graphical models have been widely applied in solving distributed inference problems in wireless networks. In this paper, we formulate the cooperative localization problem in a mobile network as an inference problem on a factor graph. …”
Get full text
Article -
612
Self-organization networking technology for 5G ultra-dense wireless network
Published 2018-03-01Subjects: “…ultra-dense wireless network…”
Get full text
Article -
613
Physical layer security of NOMA-D2D cooperative wireless system
Published 2022-09-01“…Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model was composed of base station with transmit antenna selection (TAS), NOMA far cellular user of base station and D2D transmitter, D2D receiver and passive eavesdropper, the D2D transmitter was also assumed two roles of NOMA near user of base station and decode-and-forward relay.The approximate expressions for the secrecy outage probability, non-zero secrecy capacity probability and asymptotic secrecy outage probability of NOMA-D2D cooperative wireless system under two TAS schemes were derived by using Gaussian-Chebyshev Quadrature theorem.Numerical and simulation results verify the accuracy of PLS performance analysis of NOMA-D2D cooperative wireless system.The results also show that increasing the power allocated to far cellular user under constant total power of base station can effectively improve PLS performance of NOMA-D2D cooperative wireless system.…”
Get full text
Article -
614
Wireless Network Virtualization Resource Sharing considering Dynamic Resource Allocation Algorithm
Published 2022-01-01“…In order to improve the efficiency of wireless network virtualization resource processing, this paper combines the dynamic resource allocation algorithm to construct a wireless network virtualization resource sharing model. …”
Get full text
Article -
615
Broadband Loop Antenna on Soft Contact Lens for Wireless Ocular Physiological Monitoring
Published 2014-01-01“…This paper presents a novel loop antenna with broadband for wireless ocular physiological monitoring (WOPM). The antenna is fabricated on a thin-film poly-para-xylylene C (parylene C) substrate with a small thickness of 11 μm and dimension of π×6.5×6.5 mm2. …”
Get full text
Article -
616
Performance Evaluation of Page Migration Scheme for NVRAM-Based Wireless Sensor Nodes
Published 2013-11-01“…A wireless sensor network consists of low-powered and multifunctional sensor nodes. …”
Get full text
Article -
617
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malicious attack. …”
Get full text
Article -
618
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
Published 2012-11-01“…We also discuss various forms of threats and vulnerabilities on future SCADA systems applied with IPv6 over low-power, wireless personal area networks (6LoWPANs) and suggest security management methods to overcome these concerns. …”
Get full text
Article -
619
A Clustering Protocol for Wireless Sensor Networks Based on Energy Potential Field
Published 2013-01-01“…It is the core issue of researching that how to prolong the lifetime of wireless sensor network. The purpose of this paper is to illustrate a clustering protocol LEACH-PF, which is a multihop routing algorithm with energy potential field of divided clusters. …”
Get full text
Article -
620
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
Published 2020-06-01“…In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. …”
Get full text
Article