Showing 981 - 1,000 results of 3,139 for search '"wireless"', query time: 0.09s Refine Results
  1. 981

    Concurrent transmission mechanism to mitigate pan-exposed-node problems in wireless sensor networks by Xuejian Zhao, Siguang Chen, Jing Guo, Han Hu, Zhixin Sun

    Published 2017-03-01
    “…Power control technology is widely used in wireless sensor networks to improve network performance. …”
    Get full text
    Article
  2. 982
  3. 983
  4. 984
  5. 985

    On the Performance of Interference-Based Energy-Harvesting-Enabled Wireless AF Relaying Communication Systems by Yazid M. Khattabi, Yazan H. Al-Badarneh, Mohamed-Slim Alouini

    Published 2024-01-01
    “…This article considers an interference-based radio-frequency energy harvesting (RF-EH)-empowered wireless dual-hop amplify-and-forward relaying system in which an ambient interferer is beneficially utilized as the solely free power source for EH and detrimentally considered as the dominant factor that corrupts its receivers. …”
    Get full text
    Article
  6. 986

    Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks by Vinod Namboodiri, Abtin Keshavarzian

    Published 2011-01-01
    “…Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. …”
    Get full text
    Article
  7. 987

    Pair-wise key establishment for wireless sensor networks based on fully homomorphic encryption by Yong ZHANG, Tao WEN, Quan GUO, Feng-kun LI

    Published 2012-10-01
    “…An attack on the permutation-based multi-polynomial scheme exposed in the paper of Guo was proposed.The scheme couldn’t frustrate the large-scale node capture attack was proved.A pair-wise key establishment scheme was proposed by introducing homomorphic encryption thought,which was used to protect polynomials and made all keys be established in encrypted state.Therefore,the large-scale node capture attack was thwarted because adversaries couldn’t get any information about polynomials from the encrypted data used to establish keys.A method was presented to achieve fully homomorphic encryption indirectly,which used much less storage and computation resource than existing fully homomorphic encryption.The analysis and experiment show our pair-wise key establishment scheme has very good performance in terms of storage,computation as well as communication and is suitable to wireless sensor networks with limited capability.…”
    Get full text
    Article
  8. 988
  9. 989
  10. 990

    ASMT: An augmented state-based multi-target tracking algorithm in wireless sensor networks by Kejiang Xiao, Rui Wang, Lei Zhang, Jian Li, Tun Fun

    Published 2017-04-01
    “…Due to the resource limitation and low performance of sensor node, research works of multi-target tracking became a hot spot in the applications of wireless sensor networks. Here, we propose an algorithm named augmented state-based multi-target tracking algorithm. …”
    Get full text
    Article
  11. 991
  12. 992
  13. 993

    Time-selective data fusion for in-network processing in ad hoc wireless sensor networks by Jaanus Kaugerand, Johannes Ehala, Leo Mõtus, Jürgo-Sören Preden

    Published 2018-11-01
    “…This article introduces a time-selective strategy for enhancing temporal consistency of input data for multi-sensor data fusion for in-network data processing in ad hoc wireless sensor networks. Detecting and handling complex time-variable (real-time) situations require methodical consideration of temporal aspects, especially in ad hoc wireless sensor network with distributed asynchronous and autonomous nodes. …”
    Get full text
    Article
  14. 994

    Node Selection Algorithms with Data Accuracy Guarantee in Service-Oriented Wireless Sensor Networks by Hongju Cheng, Ronglie Guo, Yuzhong Chen

    Published 2013-04-01
    “…The service-oriented architecture is considered as a new emerging trend for the future of wireless sensor networks in which different types of sensors can be deployed in the same area to support various service requirements. …”
    Get full text
    Article
  15. 995
  16. 996
  17. 997

    Novel Energy-Efficient Miner Monitoring System with Duty-Cycled Wireless Sensor Networks by Peng Guo, Tao Jiang, Kui Zhang

    Published 2012-01-01
    “…Target monitoring is an important application of wireless sensor networks. In this paper, we develop an energy-efficient miner monitoring system with sensor nodes. …”
    Get full text
    Article
  18. 998

    Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network by Jiliang Zhou, Ziqiang Lin

    Published 2021-02-01
    “…Clustering technology is one of the crucial technologies to prolong the lifetime in wireless sensor networks. However, most cluster schemes choose cluster head randomly to send data without considering load balancing and security. …”
    Get full text
    Article
  19. 999
  20. 1000