Results 171 to 180 of about 396,429 (378)

Mitigating RF jamming attacks at the physical layer with machine learning

open access: yesIET Communications, Volume 17, Issue 1, Page 12-28, January 2023., 2023
Abstract Wireless communication devices must be protected from malicious threats, including active jamming attacks, due to the widespread use of wireless systems throughout our every‐day lives. Jamming mitigation techniques are predominately evaluated through simulation or with hardware for very specific jamming conditions.
Marko Jacovic   +3 more
wiley   +1 more source

Routing protocol for wireless quantum multi-hop Mesh backbone network based on partially entangled GHZ state [PDF]

open access: yesarXiv, 2016
Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multi-hop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger--Horne--Zeilinger ...
arxiv  

Dilated cardiomyopathy evaluation with Imagenomics: combining multimodal cardiovascular imaging and genetics

open access: yesESC Heart Failure, EarlyView.
Systematic approach to dilated cardiomyopathy diagnosis. Dilated cardiomyopathy is a clinical diagnosis characterized by the presence of left ventricular dilatation and systolic disfunction unexplained by abnormal loading conditions or coronary artery disease.
Kristian Galanti   +14 more
wiley   +1 more source

HR‐HAR: A hierarchical relation representation for human activity recognition based on Wi‐Fi

open access: yesIET Communications, Volume 17, Issue 1, Page 29-44, January 2023., 2023
Abstract The Wi‐Fi‐based human activity recognition shows immense potential, as it is device‐free, non‐intrusive to privacy, and low‐cost. However, current learning‐based recognition methods mostly adopt the hybrid representation without distinguished contributions of features to different activities, which will be seriously affected by environment ...
Yanglin Pu   +2 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Secure Geographic Routing Protocols: Issues and Approaches [PDF]

open access: yesInternational Journal of Computer Science Issues 8(4): 382-389 (2011), 2011
In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of ...
arxiv  

Adaptive Routing Protocol For Dynamic Wireless Sensor Networks

open access: yes, 2015
The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements.
Alhamoui, Fayez Mostafa   +1 more
openaire   +2 more sources

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy