Results 51 to 60 of about 7,170,285 (372)

Control of wireless networks with secrecy [PDF]

open access: yes2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, 2010
To appear in IEEE/ACM Transactions on ...
Köksal, Can Emre   +2 more
openaire   +6 more sources

AI Model Selection and Monitoring for Beam Management in 5G-Advanced

open access: yesIEEE Open Journal of the Communications Society
This paper investigates the application of artificial intelligence (AI) to wireless technology, specifically in the context of beam management (BM) in the advanced 5th-generation (5G) communication system.
Chen Sun   +6 more
doaj   +1 more source

Full-Duplex Mode in Amplify-and-Forward Relay Channels: Outage Probability and Ergodic Capacity

open access: yesInternational Journal of Antennas and Propagation, 2014
This paper investigates the outage probability and ergodic capacity performances for full-duplex mode in two-way amplify-and-forward relay channels. The two-way relay channels which consist of two source nodes and a single relay node working in full ...
Rongyi Hu   +4 more
doaj   +1 more source

Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Traditional rogue access-point (AP) detection mechanisms are employed in network administration to protect network infrastructure and organization; however, these mechanisms do not protect end users from connecting to a rogue-AP.
Songrit Kitisriworapan   +2 more
doaj   +1 more source

Resource Aware Sensor Nodes in Wireless Sensor Networks [PDF]

open access: yes, 2005
Wireless sensor networks are continuing to receive considerable research interest due, in part, to the range of possible applications. One of the greatest challenges facing researchers is in overcoming the limited network lifetime inherent in the small ...
Al-Hashimi, Bashir M.   +3 more
core   +1 more source

Wireless Jamming Networks [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
A mobile jammer is a device which is used to jam signals of a cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the working of a cell phone from not receiving signal ...
openaire   +2 more sources

Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network [PDF]

open access: yesIEEE Wireless Communications Letters, 2017
In wireless sensor networks, utilizing the unmanned aerial vehicle (UAV) as a mobile data collector for the sensor nodes (SNs) is an energy-efficient technique to prolong the network lifetime.
Cheng Zhan, Yong Zeng, Rui Zhang
semanticscholar   +1 more source

Algebraic Network Coding Approach to Deterministic Wireless Relay Networks [PDF]

open access: yes, 2010
The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network model, takes into account the broadcast nature of wireless medium and ...
Kim, MinJi, Medard, Muriel
core   +4 more sources

EA-ADMM: noisy tensor PARAFAC decomposition based on element-wise average ADMM

open access: yesEURASIP Journal on Advances in Signal Processing, 2022
Tensor decomposition is widely used to exploit the internal correlation in multi-way data analysis and process for communications and radar systems.
Gang Yue, Zhuo Sun
doaj   +1 more source

Is broadcast plus multiaccess optimal for Gaussian wireless networks? [PDF]

open access: yes, 2003
In this paper we show that "separation"-based approaches in wireless networks do not necessarily give good performance in terms of the capacity of the network.
Dana, Amir F.   +4 more
core  

Home - About - Disclaimer - Privacy