Results 21 to 30 of about 120,162 (227)

Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks

open access: yesApplied Sciences, 2020
Most mobile ad hoc wireless networks have social features. It is a fundamental problem how to understand the performances of social-aware mobile ad hoc wireless networks.
Yang Zhou, Yan Shi, Shanzhi Chen
doaj   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Achieving Small World Properties using Bio-Inspired Techniques in Wireless Networks [PDF]

open access: yes, 2012
It is highly desirable and challenging for a wireless ad hoc network to have self-organization properties in order to achieve network wide characteristics.
Agarwal, Rachit   +5 more
core   +2 more sources

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

open access: yes, 2010
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes ...
Al-Omari, Saleh Ali K., Sumari, Putra
core   +2 more sources

CFFD-MAC: A Hybrid MAC for Collision Free Full-Duplex Communication in Wireless Ad-Hoc Networks

open access: yesIEEE Access, 2021
Infrastructure-less (sometimes known as ad-hoc) networking paradigm is very appealing and potentially shaping its future into almost all emerging networks (i.e., IoT, wireless sensor networks, vehicular ad-hoc networks, emergency, and tactical radio ...
Rukaiya Rukaiya   +4 more
doaj   +1 more source

Continuum percolation of wireless ad hoc communication networks

open access: yes, 2003
Wireless multi-hop ad hoc communication networks represent an infrastructure-less and self-organized generalization of todays wireless cellular networks. Connectivity within such a network is an important issue.
Albert   +26 more
core   +2 more sources

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

open access: yes, 2014
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-
Bild, David R.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy