Results 121 to 130 of about 514 (147)

6TiSCH, enabling IPv6 over 802.15.4 TSCH

open access: yes, 2019
Thubert, Pascal   +2 more
openaire   +1 more source

Anti-inflammatory effects of oral prednisolone at stable state in people treated with mepolizumab: a proteomic and bulk transcriptomics analysis

open access: yes
Howell I   +14 more
europepmc   +1 more source

Inflammatory and clinical risk factors for asthma attacks (ORACLE2): a patient-level meta-analysis of control groups of 22 randomised trials.

open access: yesLancet Respir Med
Meulmeester FL   +26 more
europepmc   +1 more source

Distributed TSCH scheduling: A comparative analysis

2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2017
Industrial applications demand for ease of deployment, reliability and low-power in wireless networks, leading to standards like IEEE802.15.4, which include time synchronized channel hopping mechanisms. Yet, scheduling of transmissions on timeslots and channels falls outside the scope of current standards.
van der Lee, Tim   +2 more
openaire   +2 more sources

TSCH schedules assessment

2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), 2017
Safety and security in marine environments is an emerging application area of low-power wireless sensor networks. Yet, these environments pose big challenges to network reliability. The IEEE802.15.4-TSCH protocol has been extensively regarded as a reliable low-power wireless sensor network solution. It requires, though, an external scheduling mechanism
van der Lee, Tim   +2 more
openaire   +2 more sources

R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks

2018 IEEE Symposium on Computers and Communications (ISCC), 2018
Time Slotted Channel Hopping (TSCH) has been proposed in various wireless protocols as a solution to combat external interference, path-loss fading and static jamming attacks. However, since TSCH algorithms generate a deterministic and periodic pattern of channel hops, they are still subject to jamming attacks.
Dimitrios Zorbas   +2 more
openaire   +1 more source

RL-TSCH: A Reinforcement Learning Algorithm for Radio Scheduling in TSCH 802.15.4e

2019 International Conference on Information and Communication Technology Convergence (ICTC), 2019
In order to apply Internet of Things technologies into real world, the low-power low-cost protocol stack CoAP/UDP/IPv6/RPL/6LoWPAN/802.15.4-802.15.4e is a good solution and appropriate to low-power low-cost applications. The standard IEEE 802.15.4e utilizes scheduled-based multiple access approach in this, at the beginning of each time slot, the nodes ...
Hung Nguyen-Duy   +5 more
openaire   +1 more source

TSCH Meets BLE: Routed Mesh Communication Over BLE

2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), 2023
Bluetooth Low Energy (BLE) is the prevalent communication protocol for the Internet of Things. However, for time-critical applications requiring time-synchronized multi-hop networks with often multiple node exchanging data at the same time slot, BLE lacks a solution.
Harms, Laura, Landsiedel, Olaf
openaire   +1 more source

Home - About - Disclaimer - Privacy