Results 71 to 80 of about 9,915 (216)

Heavy Dark Matter Annihilation from Effective Field Theory [PDF]

open access: yes, 2014
We formulate an effective field theory description for SU(2)$_L$ triplet fermionic dark matter by combining nonrelativistic dark matter with gauge bosons in the soft-collinear effective theory. For a given dark matter mass, the annihilation cross section
Ovanesyan, Grigory   +2 more
core   +2 more sources

Security Issues in WBANs

open access: yes, 2019
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. Being
Asam, Muhammad   +4 more
openaire   +2 more sources

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Designing Transmission Strategies for Enhancing Communications in Medical IoT Using Markov Decision Process

open access: yesSensors, 2018
The introduction of medical Internet of Things (IoT) for biomedical applications has brought about the era of proactive healthcare. Such advanced medical supervision lies on the foundation of a network of energy-constrained wearable or implantable ...
Moumita Roy   +2 more
doaj   +1 more source

Network selection in cognitive radio enabled Wireless Body Area Networks

open access: yesDigital Communications and Networks, 2020
In recent years, the great interest in Wireless Body Area Networks (WBANs) has been aroused significantly due to the advancement in wireless communications.
Monish Bhatia, Krishan Kumar
doaj   +1 more source

Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review

open access: yes, 2018
Privacy problems are lethal and getting more attention than any other issue with the notion of the Internet of Things (IoT). Since IoT has many application areas including smart home, smart grids, smart healthcare system, smart and intelligent ...
Ali, Inayat, Khan, Eraj, Sabir, Sonia
core   +2 more sources

Optimization mechanism of energy efficiency in coexisting wireless body area networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract This paper studies the optimization of energy efficiency in coexisting wireless body area networks (WBANs). A solution based on combining a naive Bayesian classifier with the Hungarian algorithm is proposed to improve link transmission energy efficiency.
Yuting Qian, Kunqi Guo
wiley   +1 more source

Energy-Delay Tradeoff and Dynamic Sleep Switching for Bluetooth-Like Body-Area Sensor Networks

open access: yes, 2012
Wireless technology enables novel approaches to healthcare, in particular the remote monitoring of vital signs and other parameters indicative of people's health.
Caire, Giuseppe   +2 more
core   +1 more source

A reliable design of Wireless Body Area Networks [PDF]

open access: yes, 2013
International audienceIn this paper, we propose a reliable topology design and provisioning approach for Wireless Body Area Networks (named RTDP-WBAN) that takes into account the mobility of the patient while guaranteeing a reliable data delivery ...
Elias, Jocelyne   +4 more
core   +2 more sources

Modelling a Reliable Multimedia Transmission Approach for Medical Wireless Sensor Networks

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The process of secret key sharing utilises the sender's public secret key and the receiver's private secret key to generate a shared secret key between the two devices. This same secret key generation method applies to communication between a sensor and a base station, whether in single‐hop or multi‐hop scenarios. Once the secret key is generated, data
R. Nidhya   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy