Showing 601 - 620 results of 3,139 for search '"wireless"', query time: 0.05s Refine Results
  1. 601

    An estimated Hungarian method for data forwarding problem in underwater wireless sensor networks by Jing Wen, Dongwei Li, Linfeng Liu, Jiabin Yuan

    Published 2018-05-01
    “…With the increasing concern over marine applications in recent years, the technology of underwater wireless sensor networks has received considerable attention. …”
    Get full text
    Article
  2. 602
  3. 603
  4. 604

    A Dual-Cycle Architecture in Cognitive M2M Wireless Networks by Ying Li, Xu Dong, Lifeng Wang, Xiaobo Guo, Lin Bai

    Published 2013-11-01
    “…Dual-cycle cognitive model (DCCM) is an effective means to develop the future large-scale cognitive wireless networks. In this paper, the DCCM is considered to construct cognitive wireless netwroks, in which the structure and implementation of service-oriented radio architecture (SORA) are expounded. …”
    Get full text
    Article
  5. 605

    Integration and Analysis of Neighbor Discovery and Link Quality Estimation in Wireless Sensor Networks by Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak

    Published 2014-01-01
    “…Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. …”
    Get full text
    Article
  6. 606

    Energy-Efficient Self-Organized Clustering with Splitting and Merging for Wireless Sensor Networks by Kyuhong Lee, Heesang Lee

    Published 2013-03-01
    “…Energy efficiency is one of the most important issues for WSNs, because the battery of each wireless sensor node cannot be recharged or replaced. …”
    Get full text
    Article
  7. 607

    Scenario-adaptive wireless fall detection system based on few-shot learning by Yuting ZENG, Suzhi BI, Lili ZHENG, Xiaohui LIN, Hui WANG

    Published 2023-06-01
    “…A scenario robust fall detection system based on few-shot learning (FDFL) in wireless environment was designed.The performance of existing fall detection methods based on Wi-Fi channel state information (CSI) degrades significantly across scenarios, which requires collecting and marking a large number of CSI samples in each application scenario, resulting in high cost for large-scale deployment.Therefore, the method of few-shot learning was introduced, which can maintain the performance of fall detection with high accuracy when the number of annotated samples in unfa-miliar scenes is insufficient.The proposed FDFL was mainly divided into two stages, source domain meta-training and target domain meta-learning.The meta training stage of the source domain consists of two parts: data preprocessing and classification training.In the data preprocessing stage, the collected original CSI amplitude and phase data were denoised and segmented.In the classification training stage, a large number of processed source domain data samples were used to train a CSI feature extractor based on convolutional neural network.In the meta-learning stage of the target domain, the limited labeled data sampled in the target domain was effectively extracted based on the feature extractor trained in the meta-training module, and then a lightweight machine learning classifier was trained to detect the fall behavior under the cross-scene.Through several experiments in different scenarios, FDFL can achieve an average accuracy of 95.52% for the four classification tasks of falling, sitting, walking and sit down with only a small number of samples in the target domain, and maintain robust detection accuracy for changes in test environment, personnel target and equipment location.…”
    Get full text
    Article
  8. 608
  9. 609

    Block Least Mean Squares Algorithm over Distributed Wireless Sensor Network by T. Panigrahi, P. M. Pradhan, G. Panda, B. Mulgrew

    Published 2012-01-01
    “…Both these conventional distributed algorithms involve significant communication overheads and, consequently, defeat the basic purpose of wireless sensor networks. In the present paper, we therefore propose two new distributed algorithms, namely, block diffusion least mean square (BDLMS) and block incremental least mean square (BILMS) by extending the concept of block adaptive filtering techniques to the distributed adaptation scenario. …”
    Get full text
    Article
  10. 610
  11. 611

    Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks by Wei Li, Zhen Yang, Haifeng Hu

    Published 2014-08-01
    “…Graphical models have been widely applied in solving distributed inference problems in wireless networks. In this paper, we formulate the cooperative localization problem in a mobile network as an inference problem on a factor graph. …”
    Get full text
    Article
  12. 612
  13. 613

    Physical layer security of NOMA-D2D cooperative wireless system by Yifan DING, Guangqiu LI, Hui LI

    Published 2022-09-01
    “…Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model was composed of base station with transmit antenna selection (TAS), NOMA far cellular user of base station and D2D transmitter, D2D receiver and passive eavesdropper, the D2D transmitter was also assumed two roles of NOMA near user of base station and decode-and-forward relay.The approximate expressions for the secrecy outage probability, non-zero secrecy capacity probability and asymptotic secrecy outage probability of NOMA-D2D cooperative wireless system under two TAS schemes were derived by using Gaussian-Chebyshev Quadrature theorem.Numerical and simulation results verify the accuracy of PLS performance analysis of NOMA-D2D cooperative wireless system.The results also show that increasing the power allocated to far cellular user under constant total power of base station can effectively improve PLS performance of NOMA-D2D cooperative wireless system.…”
    Get full text
    Article
  14. 614

    Wireless Network Virtualization Resource Sharing considering Dynamic Resource Allocation Algorithm by Xueming Guan, Yaozhi Ma

    Published 2022-01-01
    “…In order to improve the efficiency of wireless network virtualization resource processing, this paper combines the dynamic resource allocation algorithm to construct a wireless network virtualization resource sharing model. …”
    Get full text
    Article
  15. 615

    Broadband Loop Antenna on Soft Contact Lens for Wireless Ocular Physiological Monitoring by Ssu-Han Ting, Bo-Ming Jeng, Wen-Shan Chen, Jin-Chern Chiou, Ching-Hsing Luo

    Published 2014-01-01
    “…This paper presents a novel loop antenna with broadband for wireless ocular physiological monitoring (WOPM). The antenna is fabricated on a thin-film poly-para-xylylene C (parylene C) substrate with a small thickness of 11 μm and dimension of π×6.5×6.5 mm2. …”
    Get full text
    Article
  16. 616

    Performance Evaluation of Page Migration Scheme for NVRAM-Based Wireless Sensor Nodes by Yeonseung Ryu

    Published 2013-11-01
    “…A wireless sensor network consists of low-powered and multifunctional sensor nodes. …”
    Get full text
    Article
  17. 617

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malicious attack. …”
    Get full text
    Article
  18. 618

    Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks by HyungJun Kim

    Published 2012-11-01
    “…We also discuss various forms of threats and vulnerabilities on future SCADA systems applied with IPv6 over low-power, wireless personal area networks (6LoWPANs) and suggest security management methods to overcome these concerns. …”
    Get full text
    Article
  19. 619

    A Clustering Protocol for Wireless Sensor Networks Based on Energy Potential Field by Zuo Chen, Yao Xiao, Xiaodong Li, Renfa Li

    Published 2013-01-01
    “…It is the core issue of researching that how to prolong the lifetime of wireless sensor network. The purpose of this paper is to illustrate a clustering protocol LEACH-PF, which is a multihop routing algorithm with energy potential field of divided clusters. …”
    Get full text
    Article
  20. 620

    An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks by Shahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani

    Published 2020-06-01
    “…In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. …”
    Get full text
    Article