Results 21 to 30 of about 514 (147)
GT-TSCH: Game-Theoretic Distributed TSCH Scheduler for Low-Power IoT Networks
43rd IEEE International Conference on Distributed Computing ...
Tavallaie, O +3 more
openaire +3 more sources
QL-TSCH-plus: A Q-learning Distributed Scheduling Algorithm for TSCH Networks
Addressing the requirements of Industrial Internet of Things (IIoT) in Industry 4.0, the Time Slotted Channel Hopping (TSCH) protocol of the IEEE 802.15.4e amendment has been proposed. However, the lack of a defined scheduling procedure in the standard remains an open research area. Existing reinforcement learning-based scheduling proposals demonstrate
Kherbache, Mehdi +2 more
openaire +2 more sources
Time-slotted channel hopping (TSCH) is a medium access control technology that realizes collision-free wireless network communication by coordinating the media access time and channel of network devices.
Huiung Park +3 more
doaj +1 more source
Coexistence Analysis of Multiple Asynchronous IEEE 802.15.4 TSCH-Based Networks
Low-power Wireless Sensor Networks (WSNs) play a key role in realization of the Internet-of-Things (IoT). Among others, Time Slotted Channel Hopping (TSCH) is a Medium Access Control (MAC) operational mode of the IEEE 802.15.4 standard developed for ...
Farzad Veisi, Majid Nabi, Hossein Saidi
doaj +1 more source
TSCH for Long Range Low Data Rate Applications
The TSCH (Time Slotted Channel Hopping) protocol from the IEEE 802.15.4-2015 standard is known to be suitable for highly reliable applications in low-power networks of severely constrained wireless embedded devices.
Rajeev Piyare +2 more
doaj +1 more source
Abstract Shipborne observations from the CAPRICORN‐2018 field campaign were used to investigate the characteristics and variability of precipitation across different sectors of an extra‐tropical cyclone on 16 February 2018, over the Southern Ocean (SO). Three distinct time periods—frontal, post‐frontal, and cyclone—were identified during the day.
S. C. H. Truong +5 more
wiley +1 more source
Data security in smart devices: Advancement, constraints and future recommendations
The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks.
Zhang Wenhua +6 more
wiley +1 more source
DualBlock: Adaptive Intra-Slot CSMA/CA for TSCH
IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) has drawn significant attention as a low-power network solution for the Internet of Things (IoT). To make the TSCH scalable and robust, slot scheduling is an important issue that needs to be addressed ...
Jeongjun Park +3 more
doaj +1 more source
An Efficient Anycast Mechanism for 802.15.4‐TSCH to Improve QoS in IIoT
The Industrial Internet of Things (IIoT) has emerged as a technology that automates industrial processes. In IIoT networks, data are collected from various nodes and sent to a base station for managerial purposes. However, in the industrial environment, network reliability and delay are significant challenges due to the high likelihood of packet loss ...
Sahand Amiri +4 more
wiley +1 more source
The ERA5 reanalysis under‐represents the number of inferred cloud layers at high latitudes over the Southern Ocean. Cloud layers inferred from the ERA5 profiles are geometrically thinner and shallower than those inferred from the observed soundings. A fine‐resolution representation of thin multiple cloud layers can help reduce the shortwave radiation ...
Son C. H. Truong +4 more
wiley +1 more source

