Results 41 to 50 of about 192,457 (251)
Joint resource configuration method for secure fog computing Internet of things
The current fog computing Internet of things (IoT) systems are prone to eavesdropping attacks in the process of physical communication transmission, and the existing research on fog computing has not effectively solved this problem.In order to realize ...
Shibo ZHANG +4 more
doaj +2 more sources
Game Theoretic Approaches to Massive Data Processing in Wireless Networks
Wireless communication networks are becoming highly virtualized with two-layer hierarchies, in which controllers at the upper layer with tasks to achieve can ask a large number of agents at the lower layer to help realize computation, storage, and ...
Han, Zhu +4 more
core +1 more source
As a key technology for future wireless networks, massive multiple-input multiple-output (MIMO) can significantly improve the energy efficiency (EE) and spectral efficiency (SE), and the performance is highly dependant on the degree of the available ...
Gao, Xiqi +4 more
core +1 more source
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth +6 more
wiley +1 more source
We provide a joint scheme for rate control, scheduling, routing, and power control protocol for wireless sensor networks based on compressive sensing. Using a network utility maximization formulation, we present cross-layer optimization solutions using ...
Chengtie Li, Jinkuan Wang, Mingwei Li
doaj +1 more source
Network Formation Games Among Relay Stations in Next Generation Wireless Networks
The introduction of relay station (RS) nodes is a key feature in next generation wireless networks such as 3GPP's long term evolution advanced (LTE-Advanced), or the forthcoming IEEE 802.16j WiMAX standard. This paper presents, using game theory, a novel
Başar, Tamer +4 more
core +1 more source
Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley +1 more source
Novel Algorithm in Activation Process of GPON Networks
Passive optical networks are dominating access networksaround the world due to its their economical aspect, bandwidth, and penetration. It is necessary to deal with specification of these networks.
Tomas Horvath +3 more
doaj
Large-scale offshore wind energy development is crucial for energy transition. At present, there is no consideration of onshore grid accommodation capacity when integrating and planning offshore wind farm systems, which severely constrains the deployment
Ling Xu +5 more
doaj +1 more source
Data and Energy Integrated Communication Networks for Wireless Big Data
This paper describes a new type of communication network called data and energy integrated communication networks (DEINs), which integrates the traditionally separate two processes, i.e., wireless information transfer (WIT) and wireless energy transfer ...
Kun Yang +4 more
doaj +1 more source

