Showing 1,481 - 1,500 results of 3,139 for search '"wireless"', query time: 0.06s Refine Results
  1. 1481

    Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks by Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou

    Published 2012-09-01
    “…In wireless sensor networks, self-healing key-distribution schemes are used to ensure that, even if the message packets that are broadcast in some sessions get lost, the group nodes can still recover the lost session keys simply by using their personal secret keys and broadcast messages that have been received without requesting additional transmissions from the group manager. …”
    Get full text
    Article
  2. 1482
  3. 1483
  4. 1484

    Precision Irrigation Scheduling Based on Wireless Soil Moisture Sensors to Improve Water Use Efficiency and Yield for Winter Wheat in Sub-Saharan Africa by Michael Munyaradzi, Gilford Hapanyengwi, Mhosisi Masocha, Edward Mutandwa, Peter Raeth, Benny Nyambo, Amon Murwira, Emmanuel Mashonjowa

    Published 2022-01-01
    “…Recently, a lot of research has been carried out to improve irrigation water use efficiency through automation by employing wireless sensor-based monitoring systems. Further to the improvement of water use efficiency and yield, while reducing costs, a field trial was carried out at a farm in Harare, Zimbabwe, during the 2016, 2017, and 2018 winter seasons to test whether a new approach to the automated irrigation systems, one based on IoT and wirelessly connected soil sensors (called hereafter as WCSS), improves water use efficiency without reducing yield. …”
    Get full text
    Article
  5. 1485

    Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example by Jin LI, Jin CAO, Yueyu ZHANG, Meiru ZHANG, Hui LI

    Published 2021-06-01
    “…Curriculum ideological and political is a new topic in the teaching of information security major courses.The wireless communication network security course of Xidian University was taken as an example by the theory of reverse instructional design.By clarifying the concepts and principles of curriculum ideological and political construction, the curriculum ideological and political teaching design was carried out by the means of curriculum front-end design, teaching objective design, determine evaluation evidence, design learning activities, teaching Feedback.Through the demonstration of this case, the reference for how to carry out curriculum ideological and political teaching design in other courses were provided.…”
    Get full text
    Article
  6. 1486

    A review of wireless access vehicular environment multichannel operational medium access control protocols: Quality-of-service analysis and other related issues by Illa Ul Rasool, Yousaf Bin Zikria, Sung Won Kim

    Published 2017-05-01
    “…Wireless access vehicular environment comprises the IEEE 802.11p and IEEE 1609.4 standards responsible for handling medium access control and transmission mechanisms in vehicular ad hoc networks. …”
    Get full text
    Article
  7. 1487

    Spreading and coding for anti-interference in UWB system by XU Chen, ZHANG Shi-bing

    Published 2005-01-01
    Subjects: “…wireless communications technology…”
    Get full text
    Article
  8. 1488
  9. 1489

    Power allocation of hybrid spectrum sharing based on the spatial location by Yan CAI, Jing ZHANG, Hong-bo ZHU

    Published 2014-02-01
    Subjects: “…wireless communication…”
    Get full text
    Article
  10. 1490
  11. 1491
  12. 1492
  13. 1493
  14. 1494
  15. 1495
  16. 1496
  17. 1497
  18. 1498
  19. 1499
  20. 1500