Results 11 to 20 of about 87,050 (173)

Monitoring the Transmission of Data From Wearable Sensors Using Probabilistic Transfer Learning

open access: yesIEEE Access
New applications like activity tracking and healthcare monitoring depend on secure and timely data transfer using wearable sensors. This work aims to reduce data loss and latency when transmitting wearable sensor information to analysis terminals by ...
Omar Alruwaili   +2 more
doaj   +2 more sources

Robust Communication Design in RIS-Assisted THz Channels [PDF]

open access: yesIEEE Open Journal of the Communications Society
Terahertz (THz) communication offers the necessary bandwidth to meet the high data rate demands of next-generation wireless systems. However, it faces significant challenges, including severe path loss, dynamic blockages, and beam misalignment, which ...
Yasemin Karacora   +2 more
doaj   +2 more sources

Adaptive Priority Scheduling of Internet of Things Data for Disaster Management in Smart Cities

open access: yesIEEE Access
In the recent context of the emergence of smart cities, the massive amount of data generated by connected objects has led to unprecedented demands in terms of data transfer. The various constraints linked to their number, their characteristics, and their
Marie C. Pognon   +2 more
doaj   +2 more sources

Modeling and simulation of dynamic lane reversal using a cell transmission model

open access: yesJournal of Intelligent Transportation Systems / Taylor & Francis, 2021
In recent years, large-scale testing has begun for connected and autonomous driving, making it possible to implement the concept of Dynamic Lane Reversal (DLR), which can quickly shift lane directions to reflect instantaneous flow dynamics.
Q. Fu, Ye Tian, Jian Sun
semanticscholar   +1 more source

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Buffer Sizing for 802.11 Based Networks [PDF]

open access: yes, 2011
We consider the sizing of network buffers in 802.11 based networks. Wireless networks face a number of fundamental issues that do not arise in wired networks. We demonstrate that the use of fixed size buffers in 802.11 networks inevitably leads to either
Leith, Douglas   +2 more
core   +2 more sources

Modeling of a heterogeneous packet-switched data network as a queuing system with absolute priority and channel resource redundancy

open access: yesT-Comm, 2021
The article deals with the solution of a timely and relevant scientific and technical problem of modeling the data transmission network of a system for monitoring the state of critical state facilities.
S. Saitov
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy