Results 11 to 20 of about 1,290,040 (147)
Increased longevity of wireless Ad hoc network through fuzzy system [PDF]
The Ad hoc network is one of the multistep-based self-organizing networks, which are dynamically changing and are taken more into account as the ways of connecting the terminals through the development of wireless communication terminals.
Fawzia Abdali Larki +2 more
doaj +1 more source
A Lightweight Authentication MAC Protocol for CR-WSNs
Cognitive radio (CR) has emerged as one of the most investigated techniques in wireless networks. Research is ongoing in terms of this technology and its potential use. This technology relies on making full use of the unused spectrum to solve the problem
Bashayer Othman Aloufi, Wajdi Alhakami
doaj +1 more source
How to Choose the Relevant MAC Protocol for Wireless Smart Parking Urban Networks? [PDF]
Parking sensor network is rapidly deploying around the world and is regarded as one of the first implemented urban services in smart cities. To provide the best network performance, the MAC protocol shall be adaptive enough in order to satisfy the ...
Lin, Trista +2 more
core +4 more sources
In this paper, we consider a wireless-powered dual-relay network consisting of one multi-antenna source, two single-antenna energy-constrained relays and one single-antenna destination without direct source to destination link.
Guojie Hu +3 more
doaj +1 more source
Integration of cellular network and wireless LAN [PDF]
This study discusses the significant problems accommodated in the integration of cellular networks and WLANs to the service providers, end-users, etc. This study aims about the current complications, current challenges, substantial significance, future ...
Indran, Taruna Kugan +5 more
core
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu +3 more
doaj +1 more source
Mitigating Receiver’s Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data Transfer [PDF]
Reliable in-order multi-path data transfer under asymmetric heterogeneous network conditions has known problems related to receiver's buffer blocking, caused by out of order packet arrival.
Boreli, Roksana +4 more
core +1 more source
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service
M. Isabel Vara, Celeste Campo
doaj +1 more source
Message-Based Communication for Heterogeneous Internet of Things Systems
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system.
Bogdan Oniga +3 more
doaj +1 more source
Development of an Adaptive File Transfer Protocol (AFTP ) [PDF]
File is one of the main storing units of information. There is a great need to transfer file through computer network especially the internet. The model that is used in Internet is the TCP-IP. The TCP-IP model consists of four layers. The lowest layer is
Alaa Noori Mazher +2 more
doaj +1 more source

