Results 71 to 80 of about 22,602 (224)

User-space Multipath UDP in Mosh [PDF]

open access: yes, 2015
In many network topologies, hosts have multiple IP addresses, and may choose among multiple network paths by selecting the source and destination addresses of the packets that they send.
Boutier, Matthieu, Chroboczek, Juliusz
core   +3 more sources

Deep Reinforcement Learning Reconfigurable Smart Surface Sensing MAC Protocol for Terahertz Mesh Networks

open access: yesIET Networks, Volume 15, Issue 1, January/December 2026.
This paper proposes a reconfigurable intelligent surface‐based deep reinforcement learning MAC (RIS‐DRL‐MAC) protocol for terahertz mesh networks. By embedding RIS perception into the MAC decision loop and using a distributed TD3 algorithm, the proposed scheme achieves a cross‐layer optimisation of beam direction, access timing and RIS phase control ...
Wenjian Zhang, Ping Li
wiley   +1 more source

Trajectory Optimisation for UAV Data Collection in IoT‐Based WSN: A Lévy Flight‐Based Approach

open access: yesIET Smart Cities, Volume 8, Issue 1, January/December 2026.
In large‐scale IoT and WSN deployments, data transmission to base stations is often limited by restricted network coverage, and drones can help extend connectivity by collecting data from cluster head nodes. This work proposes an energy‐efficient drone‐assisted data collection approach that jointly optimises system costs and energy consumption, taking ...
Hamayadji Abdoul Aziz   +6 more
wiley   +1 more source

Collaborative communication protocols for wireless sensor networks [PDF]

open access: yes, 2003
In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication.
Dulman, Stefan   +3 more
core   +2 more sources

On QoS-assured degraded provisioning in service-differentiated multi-layer elastic optical networks

open access: yes, 2017
The emergence of new network applications is driving network operators to not only fulfill dynamic bandwidth requirements, but offer various grades of service. Degraded provisioning provides an effective solution to flexibly allocate resources in various
Figueiredo, Gustavo B.   +6 more
core   +1 more source

Assessment Method for Driving Risk of Heavy‐Duty Trucks at Interchange Ramps

open access: yesJournal of Advanced Transportation, Volume 2026, Issue 1, 2026.
The accident rate of interchange ramps based on investigated Chinese cases is approximately two times higher than that of mainline sections, where losses in human lives and economic costs caused by heavy‐duty truck (HDT) accidents are far greater than those of sedans. Nevertheless, existing risk assessments overlook the coupled effects of human–vehicle–
Xiaomin Yan   +6 more
wiley   +1 more source

An Energy-Efficient Multipath Routing Algorithm Based on Ant Colony Optimization for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
An energy-efficient ACO-based multipath routing algorithm (EAMR) is proposed for energy-constrained wireless sensor networks. EAMR is a hybrid multipath algorithm, which is reactive in path discovery and proactive in route maintenance.
Mengjun Tong   +4 more
doaj   +1 more source

Adaptive Probabilistic Flooding for Multipath Routing

open access: yes, 2011
In this work, we develop a distributed source routing algorithm for topology discovery suitable for ISP transport networks, that is however inspired by opportunistic algorithms used in ad hoc wireless networks.
Betoule, Christophe   +5 more
core   +2 more sources

Fuzzy‐Based Optimized Cluster Head Selection With Energy Prediction for Unequal Clustering in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
The sensor network consists of several low‐powered electronic sensing devices that are strategically deployed in a predefined area to gather important information. The sensors have low computing capacity, constrained battery energy, and limited storage. Therefore, the sensed data should be communicated to the sink efficiently for further processing. In
Shivendra Kumar Pandey   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy