Results 11 to 20 of about 1,290,040 (147)

Increased longevity of wireless Ad hoc network through fuzzy system [PDF]

open access: yesDecision Science Letters, 2014
The Ad hoc network is one of the multistep-based self-organizing networks, which are dynamically changing and are taken more into account as the ways of connecting the terminals through the development of wireless communication terminals.
Fawzia Abdali Larki   +2 more
doaj   +1 more source

A Lightweight Authentication MAC Protocol for CR-WSNs

open access: yesSensors, 2023
Cognitive radio (CR) has emerged as one of the most investigated techniques in wireless networks. Research is ongoing in terms of this technology and its potential use. This technology relies on making full use of the unused spectrum to solve the problem
Bashayer Othman Aloufi, Wajdi Alhakami
doaj   +1 more source

How to Choose the Relevant MAC Protocol for Wireless Smart Parking Urban Networks? [PDF]

open access: yes, 2014
Parking sensor network is rapidly deploying around the world and is regarded as one of the first implemented urban services in smart cities. To provide the best network performance, the MAC protocol shall be adaptive enough in order to satisfy the ...
Lin, Trista   +2 more
core   +4 more sources

Joint design of beamforming and time switching/power splitting for wireless-powered multi-antenna dual-relay network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
In this paper, we consider a wireless-powered dual-relay network consisting of one multi-antenna source, two single-antenna energy-constrained relays and one single-antenna destination without direct source to destination link.
Guojie Hu   +3 more
doaj   +1 more source

Integration of cellular network and wireless LAN [PDF]

open access: yes, 2021
This study discusses the significant problems accommodated in the integration of cellular networks and WLANs to the service providers, end-users, etc. This study aims about the current complications, current challenges, substantial significance, future ...
Indran, Taruna Kugan   +5 more
core  

Authentication and Key Establishment in Dynamic Wireless Sensor Networks

open access: yesSensors, 2010
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu   +3 more
doaj   +1 more source

Mitigating Receiver’s Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data Transfer [PDF]

open access: yes, 2013
Reliable in-order multi-path data transfer under asymmetric heterogeneous network conditions has known problems related to receiver's buffer blocking, caused by out of order packet arrival.
Boreli, Roksana   +4 more
core   +1 more source

Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

open access: yesSensors, 2015
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service
M. Isabel Vara, Celeste Campo
doaj   +1 more source

Message-Based Communication for Heterogeneous Internet of Things Systems

open access: yesSensors, 2020
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system.
Bogdan Oniga   +3 more
doaj   +1 more source

Development of an Adaptive File Transfer Protocol (AFTP ) [PDF]

open access: yesEngineering and Technology Journal, 2011
File is one of the main storing units of information. There is a great need to transfer file through computer network especially the internet. The model that is used in Internet is the TCP-IP. The TCP-IP model consists of four layers. The lowest layer is
Alaa Noori Mazher   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy