Results 21 to 30 of about 1,112,751 (384)

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security ...
Weidong Fang   +5 more
doaj   +1 more source

A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network [PDF]

open access: yes, 2010
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the lifetime of both the nodes and the network.
Dananjayan, P., Valli, R.
core   +1 more source

Analysis of Wireless Sensor Network Protocols using Data Mining Techniques [PDF]

open access: yes, 2016
A structure for extracting and mining wireless sensor data. This structure consists of a new formulation for data mining technique using the association rule by distributed extraction method.
Dole, L. (Lalit)   +2 more
core   +1 more source

QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks

open access: yesIntelligent and Converged Networks, 2021
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra   +4 more
doaj   +1 more source

An Efficient Wireless Sensor Network for Industrial Monitoring and Control

open access: yesItalian National Conference on Sensors, 2018
This paper presents the design of a wireless sensor network particularly designed for remote monitoring and control of industrial parameters. The article describes the network components, protocol and sensor deployment, aimed to accomplish industrial ...
Juan Aponte Luis   +5 more
semanticscholar   +1 more source

Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks

open access: yesIEEE Access, 2017
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo   +4 more
doaj   +1 more source

Analyze UCA Based OAM Communication From Spatial Correlation

open access: yesIEEE Access, 2020
Orbital Angular Momentum(OAM) of Electromagnetic(EM) wave can be seen as a new degree of freedom(DoF) for wireless communication besides time and frequency. Uniform Circular Antenna Array(UCA) fed with signal of equal amplitude and equal phase difference
Wei Yu   +3 more
doaj   +1 more source

Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]

open access: yes, 2009
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core   +1 more source

Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern

open access: yesInternational Journal of Distributed Sensor Networks, 2012
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang   +4 more
doaj   +1 more source

HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things

open access: yesIEEE Access, 2019
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy