Showing 781 - 800 results of 3,139 for search '"wireless"', query time: 0.05s Refine Results
  1. 781

    An Energy-Heterogeneous Clustering Scheme to Avoid Energy Holes in Wireless Sensor Networks by Gong Bencan, Jiang Tingyao, Xu Shouzhi, Chen Peng

    Published 2013-10-01
    “…However, in uniformly deployed clustering wireless sensor networks, the uneven distribution of communication loads often causes the energy-hole problem, which means that the energy of the nodes in the hole region will be used up sooner than the nodes in other regions. …”
    Get full text
    Article
  2. 782

    Wireless microwave-to-optical conversion via programmable metasurface without DC supply by Xin Ge Zhang, Ya Lun Sun, Bingcheng Zhu, Han Wei Tian, Bo Yuan Wang, Zaichen Zhang, Cheng-Wei Qiu, Tie Jun Cui, Wei Xiang Jiang

    Published 2025-01-01
    “…This work represents a decisive step towards microwave-optical interconversion on wireless and battery-free interfaces.…”
    Get full text
    Article
  3. 783

    Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain by Yukun NIU, Lingbo WEI, Chi ZHANG, Xia ZHANG, Vejarano Gustavo

    Published 2020-04-01
    “…In designing an access control scheme for public wireless LAN (WLAN),user privacy protection and user accountability are two conflict goals.A novel user management and access control scheme was proposed to solve this problem by utilizing the bitcoin blockchain and Intel SGX.It utilized unmodified bitcoin blockchain to manage the ownership of access credentials for users without relying on any trusted third party.It adopted Intel SGX-based mixing technology to enhance anonymity of users’ access credentials.It designed verification path rule to resolve the conflicts between the privacy-preserving and accountability objectives.The effectiveness and feasibility of the proposed scheme are also demonstrated by security analysis and performance evaluation.…”
    Get full text
    Article
  4. 784

    Efficient Cross-Layer Optimization Algorithm for Data Transmission in Wireless Sensor Networks by Chengtie Li, Jinkuan Wang, Mingwei Li

    Published 2015-01-01
    “…In this paper, we address the problems of joint design for channel selection, medium access control (MAC), signal input control, and power control with cooperative communication, which can achieve tradeoff between optimal signal control and power control in wireless sensor networks (WSNs). The problems are solved in two steps. …”
    Get full text
    Article
  5. 785

    Evolution of Scale-Free Wireless Sensor Networks with Feature of Small-World Networks by Ying Duan, Xiuwen Fu, Wenfeng Li, Yu Zhang, Giancarlo Fortino

    Published 2017-01-01
    “…Scale-free network and small-world network are the most impacting discoveries in the complex networks theories and have already been successfully proved to be highly effective in improving topology structures of wireless sensor networks. However, currently both theories are not jointly applied to have further improvements in the generation of WSN topologies. …”
    Get full text
    Article
  6. 786

    A Sensor Positioning Scheme with High Accuracy in Nonuniform Wireless Sensor Networks by Junho Park, Hyuk Park, Dong-ook Seong, Jaesoo Yoo

    Published 2013-06-01
    “…In wireless sensor networks, a geographical positioning scheme is one of core technologies for sensor applications such as disaster monitoring, environment monitoring, and military services. …”
    Get full text
    Article
  7. 787

    A Wireless Sensor Network System with a Jumping Node for Unfriendly Environments by Jun Zhang, Guangming Song, Guifang Qiao, Zhen Li, Aimin Wang

    Published 2012-07-01
    “…Mobile robots have been adopted to repair failed wireless sensor network systems for node damage, battery exhaustion, or obstacles. …”
    Get full text
    Article
  8. 788

    The evaluation of the accuracy of a wireless electronic apex locator in primary molar teeth by Aysenur Oncu, Ecem Sisko, Akif Demirel, Berkan Celikten

    Published 2024-12-01
    “…Wirele-X can provide an advantage in working length determination in children because of its wireless feature.…”
    Get full text
    Article
  9. 789
  10. 790
  11. 791

    Planar Monopoles with Different Radiator Shapes for UWB Body-Centric Wireless Communications by Y. Y. Sun, S. W. Cheung, T. I. Yuk

    Published 2013-01-01
    “…This paper presents a study on the performances of a group of planar monopoles using radiators of different shapes, such as triangle, rectangle, square, annual ring, circle, horizontal ellipse, vertical ellipse, pentagon, and hexagon, for ultra-wideband (UWB) body-centric wireless communications. The planar monopoles have the radiators with microstrip-fed line printed on one side of the substrate and a ground plane on the other side. …”
    Get full text
    Article
  12. 792
  13. 793

    An MPS-BNS Mixed Strategy Based on Game Theory for Wireless Mesh Networks by S. Q. Huang, G. C. Wang, H. H. Zhen, Z. Zhang

    Published 2013-01-01
    “…To achieve a valid effect of wireless mesh networks against selfish nodes and selfish behaviors in the packets forwarding, an approach named mixed MPS-BNS strategy is proposed in this paper. …”
    Get full text
    Article
  14. 794

    Bioinspired Evolutionary Algorithm Based for Improving Network Coverage in Wireless Sensor Networks by Mohammadjavad Abbasi, Muhammad Shafie Bin Abd Latiff, Hassan Chizari

    Published 2014-01-01
    “…Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. …”
    Get full text
    Article
  15. 795

    Compressed Sensing Based on the Characteristic Correlation of ECG in Hybrid Wireless Sensor Network by Weiwei Li, Ting Jiang, Ning Wang

    Published 2015-10-01
    “…Hybrid wireless sensor network made up of wireless body area networks (WBANs) and cellular network provides support for telemedicine. …”
    Get full text
    Article
  16. 796

    High-precision indoor wireless positioning method based on generative adversarial network by Fuzhan WANG, Xiaorong ZHU, Meijuan CHEN, Hongbo ZHU

    Published 2021-06-01
    “…Because wireless signals are susceptible to interference during the propagation process, the application of traditional indoor positioning methods in real life is limited.Because location-based fingerprint positioning technology has the advantage of strong universality, it has become a current research hotspot.The number of fingerprint data is an important factor affecting the accuracy of fingerprint positioning, but the cost of collecting a large amount of fingerprint data is large.Therefore, how to use a small amount of fingerprint data to achieve higher positioning accuracy is a difficult point of fingerprint positioning technology.Aiming at this problem, a high-precision indoor wireless positioning method based on generative adversarial network was proposed.Firstly, fingerprint data was collected densely at equal intervals indoors, and the initial fingerprint data set was constructed, the part of the fingerprint data was selected in the initial fingerprint data set, and the generative adversarial network was used to obtain a large amount of fingerprint data from part of the fingerprint data.Then, based on these generated data, a KNN (k-nearest neighbor) model and a random forest model were used for location prediction.Experimental results show that this method can achieve high wireless positioning accuracy based on a small amount of fingerprint data, and the positioning accuracy can reach 15.4 cm.…”
    Get full text
    Article
  17. 797
  18. 798

    DTW-based multi-wavelet data compression algorithm for wireless sensor networks by Si-wang ZHOU, Lan LI

    Published 2014-08-01
    Subjects: “…wireless sensor network…”
    Get full text
    Article
  19. 799

    A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks by Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li

    Published 2014-01-01
    “…The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. …”
    Get full text
    Article
  20. 800