Results 51 to 60 of about 796 (124)

Message forwarding techniques in Bluetooth enabled opportunistic communication environment [PDF]

open access: yes, 2015
These days, most of the mobile phones are smart enough with computer like intelligence and equipped with multiple communication technologies such as Bluetooth, wireless LAN, GPRS and GSM.
Khan, S., Khan, S.
core  

A Security Mechanism Based on Authenticated Diffie-Hellman for WSN [PDF]

open access: yes, 2013
Wireless sensor network (WSN) has been widely used in industrial technology, national defense,  robotic system[1], medical and health field. But it is hedged about in various fields due to its security problem. Through the analysis of the characteristics
Fang, JianJun, Yu, Xin, Zhang, ZhaoLi
core   +1 more source

Quality assessment technique for ubiquitous software and middleware [PDF]

open access: yes, 2006
The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than ...
Hong, G.Y., James, H., Ryu, H.
core  

Extended WIFI network design model for ubiquitous emergency events [PDF]

open access: yes
Telecommunication is the exchange of information and data over significant distance by electronic means. During extreme events such as natural disasters and urgent events it becomes more and more important to preserve the communication devices and ...
Ajami, Hicham   +2 more
core  

Real-world Bluetooth MANET Java Middleware [PDF]

open access: yes, 2009
We present BEDnet, a Java based middleware for creating and maintaining a Bluetooth based mobilead-hoc network (MANET). MANETs are key to nomadic computing: Mobile units can set up spontaneous localnetworks when needed, removing the need for fixed ...
Glenstrup, Arne John   +3 more
core  

Energy-aware on-demand scatternet formation

open access: yes, 2006
Power-aware routing algorithms aim to extend the lifetime of a wireless network by avoiding to route over nodes that are close to being depleted of energy. Previous work in such algorithms often require each node in the network to be aware of the topology of the entire network.
Johansson, Tomas, Carr-Motyckova, Lenka
openaire   +1 more source

The State-of-the-Art of Sensors and Environmental Monitoring Technologies in Buildings. [PDF]

open access: yesSensors (Basel), 2019
Hayat H   +7 more
europepmc   +1 more source

GUARDIANS final report [PDF]

open access: yes
Emergencies in industrial warehouses are a major concern for firefghters. The large dimensions together with the development of dense smoke that drastically reduces visibility, represent major challenges.
Penders, Jacques
core  

Design and development of a fly-by-wireless UAV platform [PDF]

open access: yes, 2009
Afonso, José A.   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy