Results 11 to 20 of about 34,951 (148)

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security ...
Weidong Fang   +5 more
doaj   +1 more source

Wireless Sensor Networks

open access: yes, 2014
In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected performance.
J. Portilla   +6 more
  +7 more sources

A Novel Dynamic Spectrum-Sharing Method for GEO and LEO Satellite Networks

open access: yesIEEE Access, 2020
In this article, we investigate the spectrum-sharing for a space information network comprised of a geostationary orbit (GEO) satellite and a pair of low earth orbit (LEO) satellites, where one spectrum-sensing LEO (SLEO) is used to sense the status of ...
Yunfeng Wang   +2 more
doaj   +1 more source

Analyze UCA Based OAM Communication From Spatial Correlation

open access: yesIEEE Access, 2020
Orbital Angular Momentum(OAM) of Electromagnetic(EM) wave can be seen as a new degree of freedom(DoF) for wireless communication besides time and frequency. Uniform Circular Antenna Array(UCA) fed with signal of equal amplitude and equal phase difference
Wei Yu   +3 more
doaj   +1 more source

Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks

open access: yesIEEE Access, 2017
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo   +4 more
doaj   +1 more source

Consumer Wi‐Fi device based action quality recognition: An illustrative example of seated dumbbell press action

open access: yesIET Communications, 2021
A system called WiSDP, which is based on Wi‐Fi signals, to detect whether a Seated Dumbbell Press action is standard by using inexpensive consumer Wi‐Fi devices is proposed. Compared with the scheme based on high speed cameras and wearable sensors, Wi‐Fi
Yuxi Qin   +4 more
doaj   +1 more source

Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern

open access: yesInternational Journal of Distributed Sensor Networks, 2012
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang   +4 more
doaj   +1 more source

HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things

open access: yesIEEE Access, 2019
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua   +4 more
doaj   +1 more source

QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks

open access: yesIntelligent and Converged Networks, 2021
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra   +4 more
doaj   +1 more source

An Improved Intrusion Detection Algorithm Based on GA and SVM

open access: yesIEEE Access, 2018
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy