Results 11 to 20 of about 14,472 (239)

Classification Accuracy Enhancement Based Machine Learning Models and Transform Analysis

open access: yesCommunications, 2021
The problem of leak detection in water pipeline network can be solved by utilizing a wireless sensor network based an intelligent algorithm. A new novel denoising process is proposed in this work.
Hanan A. R. Akkar   +4 more
doaj   +1 more source

An Adaptive WLAN Interference Mitigation Scheme for ZigBee Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
We propose an adaptive interference avoidance scheme that enhances the performance of ZigBee networks by adapting ZigBees' transmissions to measured wireless local area network (WLAN) interference. Our proposed algorithm is based on a stochastic analysis
Jo Woon Chong   +3 more
doaj   +1 more source

D-Link Solutions for Modern Computer Networks and Specialists Education in the Sphere of Network Technologies

open access: yesСовременные информационные технологии и IT-образование, 2019
The paper is devoted to a review of current trends in the telecommunications industry and shows their realization in the active network equipment of D-Link.
Philip Zakharov   +2 more
doaj   +1 more source

On Boosting Integrated WLAN & ZigBee Network Performance via Load Balancing [PDF]

open access: yesJournal of Engineering Research - Egypt, 2022
Network traffic and overload are constantly increasing. This situation leads to congestion and packet losses at bottlenecks and across the different parts and devices of the network.
Shahinaz Elkasrawy   +3 more
doaj   +1 more source

Passive-ZigBee [PDF]

open access: yesProceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, 2018
Within heterogenous IoT sensor networks, users of ZigBee devices expect long-lasting battery usage due to its ultra-low power and duty cycle. In IoT networks, to demonstrate even further ultra-low power consumption, we introduce Passive-ZigBee that demonstrates we can transform an existing productive WiFi signal into a ZigBee packet for a CoTS low ...
Yan Li, Zicheng Chi, Xin Liu, Ting Zhu
openaire   +1 more source

Testing of the Wireless Sensor Network for the Express-Diagnostic of the State of Plant

open access: yesКібернетика та комп'ютерні технології, 2020
The authors reviewed the types of network testing. The most common are simulation modeling, mock-up modeling, and full-scale experiments. It was examined existing software environments for simulation and debugging kits for mock testing.
H. Antonova, A. Kedych
doaj   +1 more source

From fitness trackers to medical devices: wearable technologies [PDF]

open access: yesBig Data and Computing Visions, 2023
Wearable technology, wearables, fashion technology, smart wear, skin electronics, or fashion electronics are smart electronic devices. Wearable technology has various applications that grow as the field expands.
Zhi Zhou
doaj   +1 more source

A Wireless Portable High Temperature Data Monitor for Tunnel Ovens

open access: yesSensors, 2014
Tunnel ovens are widely used in the food industry to produce biscuits and pastries. In order to obtain a high quality product, it is very important to control the heat transferred to each piece of dough during baking.
Ricardo Mayo Bayón   +4 more
doaj   +1 more source

Zigbee Protocol-Based Communication Network for Multi-Unmanned Aerial Vehicle Networks

open access: yesIEEE Access, 2020
This paper proposes a communication protocol for Unmanned Aerial Vehicles (UAVs) using ZigBee technology. A review of the state-of-the-art of Flying Ad-hoc Networks (FANETs) and its main respective technologies is presented in detail.
Diego S. Pereira   +6 more
doaj   +1 more source

ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys [PDF]

open access: yes2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2010
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks.
Radmand, Pedram   +6 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy