Results 21 to 30 of about 276,474 (279)
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo +4 more
doaj +1 more source
Analyze UCA Based OAM Communication From Spatial Correlation
Orbital Angular Momentum(OAM) of Electromagnetic(EM) wave can be seen as a new degree of freedom(DoF) for wireless communication besides time and frequency. Uniform Circular Antenna Array(UCA) fed with signal of equal amplitude and equal phase difference
Wei Yu +3 more
doaj +1 more source
A system called WiSDP, which is based on Wi‐Fi signals, to detect whether a Seated Dumbbell Press action is standard by using inexpensive consumer Wi‐Fi devices is proposed. Compared with the scheme based on high speed cameras and wearable sensors, Wi‐Fi
Yuxi Qin +4 more
doaj +1 more source
HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua +4 more
doaj +1 more source
Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang +4 more
doaj +1 more source
QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra +4 more
doaj +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks) [PDF]
The main focus of this article is to achieve prolonged network lifetime with overall energy efficiency in wireless sensor networks through controlled utilization of limited energy.
Babulal, Kanojia Sindhuben +1 more
core +3 more sources
An Improved Intrusion Detection Algorithm Based on GA and SVM
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj +1 more source
FCS-MBFLEACH: Designing an Energy-Aware Fault Detection System for Mobile Wireless Sensor Networks [PDF]
Wireless sensor networks (WSNs) include large-scale sensor nodes that are densely distributed over a geographical region that is completely randomized for monitoring, identifying, and analyzing physical events.
GhasemiGol, Mohammad +5 more
core +2 more sources

