Letteratura scientifica selezionata sul tema "Wireless networks"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Wireless networks".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Wireless networks"

1

M., Logambal* Dr. V. Thiagarasu. "APPLICATIONS OF WIRELESS SENSOR NETWORKS: AN OVERVIEW." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (March 5, 2017): 35–41. https://doi.org/10.5281/zenodo.345688.

Testo completo
Abstract (sommario):
A wireless sensor network is a type of wireless network consist a collection of tiny device called sensor node. Sensor node has a resource constraint means battery power, storage and communication capability. These sensor nodes are set with radio interface with which they communicated with one another to form a network. Wireless sensor network has very necessary application like remote has remote environmental monitoring and target tracking. The goal of our survey is to present a comprehensive review of the recent literature on various aspects of WSN and also discuss how wireless sensor network works and advantages and disadvantages over the traditional network. Wireless Sensor Networks are networks composed of a number of sensor nodes that communicate wirelessly. It’s utilized over a wide range of applications. This paper looks at the Wireless Sensor Networks from the applications point of view and surveyed different application areas where the use of such sensor networks and their specifications, capabilities.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

THATIPAMULA RAJU, THATIPAMULA RAJU, and D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Gurnule, Pranjali V. "Wireless Jamming Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 1931–35. http://dx.doi.org/10.31142/ijtsrd14455.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Navya, B., and M. Ankitha. "Wireless Sensor Networks." International Journal of Research Publication and Reviews 5, no. 3 (March 9, 2024): 3875–77. http://dx.doi.org/10.55248/gengpi.5.0324.0767.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Testo completo
Abstract (sommario):
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Mishra, Saurabh, Prof Rakesh Ranjan, Dr Sonika Singh, and Dr Gagan Singh. "Performance Analysis of MIMO Heterogeneous Wireless Sensor Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 12 (November 30, 2023): 25–31. http://dx.doi.org/10.35940/ijitee.l9742.11121223.

Testo completo
Abstract (sommario):
Wireless Sensor Networks (WSN) are widely used in remote applications related to defence and healthcare. A network with nodes having different capabilities like sensing, various computational capabilities, power-efficient communication, and a varied sensing range is called a heterogeneous wireless sensor network. Heterogeneous wireless sensor networks using MIMO wireless channels are more useful for energy-efficient multi-channel communication. MIMO applications in wireless sensor networks have the potential to enhance throughput, reduce End-to-End Delay, improve packet delivery ratios, and conserve energy in wireless sensor networks. Its implementation needs to be carefully considered in light of the specific deployment conditions and resource constraints of the network, considering proper antenna design, synchronisation mechanisms, and energy-efficient algorithms. This paper presents a comparative performance analysis of MIMO wireless sensor networks and traditional wireless sensor networks without MIMO for various Quality of Service parameters like Packet Delivery Ratio, End to End Delay, Throughput and Residual energy. The research work shows that the application of MIMO in Wireless Sensor Networks enables sensor nodes to collaborate effectively, leading to improved reliability and coverage, and also increases the network's lifetime by conserving energy in resource-constrained sensor nodes through the preservation of Residual Energy.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Amjad wahab taleb and Fatemeh Saf Ara. "Performance Evaluation of Virtual Local Area Network (VLANs)." Journal of the College of Basic Education 30, no. 128 (April 23, 2025): 89–103. https://doi.org/10.35950/cbej.v30i128.12842.

Testo completo
Abstract (sommario):
The medical, financial, and academic spheres can't function without cutting-edge technological advancements. When it comes to quality of service (QoS) metrics like latency, throughput, bandwidth, and security, today's technology relies on high-performance networks. The use of optimized network engineering tools has allowed for the simulation of both the wired and wireless environments on campus, including and excluding virtual local area networks (VLANs). Packets are only sent to ports that are part of the same virtual local area network (VLAN) when hosts are linked together in a VLAN. By using the distinctive VLAN network, we can enhance the performance of wireless networks while conserving bandwidth. Further, VLANs significantly improve security of wireless network by limiting the hosts amount receiving duplicate frames broadcasted by switches; This enables hosts to keep sensitive data on a separate VLAN. The study examines wireless networks and compares them to VLANs via wireless networks. With the use of online surfing apps and transfer of files in environments with high-traffic, the suggested network is tested for latency and average throughput. By using VLAN technique to partition the region of network's broadcasting, the traffic has been substantially reduced, hence alleviating the network's workload. The use of VLAN significantly enhanced WLAN performance by mitigating wireless delay, according to the findings of the simulation run using the OPNET 14.5 modeler. With time, we looked at how protocols of adhoc routing like DSR,AODV, OLSR, GPR, and TORA may boost the wireless VLANs efficiency.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Krishna, K. Hari, Y. Suresh Babu, and Tapas Kumar. "Wireless Network Topological Routing in Wireless Sensor Networks." Procedia Computer Science 79 (2016): 817–26. http://dx.doi.org/10.1016/j.procs.2016.03.111.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Habibi, Payman, Goran Hassanifard, Abdulbaghi Ghaderzadeh, and Arez Nosratpour. "Offering a Demand-Based Charging Method Using the GBO Algorithm and Fuzzy Logic in the WRSN for Wireless Power Transfer by UAV." Journal of Sensors 2023 (May 2, 2023): 1–19. http://dx.doi.org/10.1155/2023/6326423.

Testo completo
Abstract (sommario):
An extremely high number of geographically dispersed, energy-limited sensor nodes make up wireless sensor networks. One of the critical difficulties with these networks is their network lifetime. Wirelessly charging the sensors continuously is one technique to lengthen the network’s lifespan. In order to compensate for the sensor nodes’ energy through a wireless medium, a mobile charger (MC) is employed in wireless sensor networks (WRSN). Designing a charging scheme that best extends the network’s lifetime in such a situation is difficult. In this paper, a demand-based charging method using unmanned aerial vehicles (UAVs) is provided for wireless rechargeable sensor networks. In this regard, first, sensors are grouped according to their geographic position using the K-means clustering technique. Then, with the aid of a fuzzy logic system, these clusters are ranked in order of priority based on the parameters of the average percentage of battery life left in the sensor nodes’ batteries, the number of sensors, and critical sensors that must be charged, and the distance between each cluster’s center and the MC charging station. It then displays the positions of the UAV to choose the crucial sensor nodes using a routing algorithm based on the shortest and most vital path in each cluster. Notably, the gradient-based optimization (GBO) algorithm has been applied in this work for intracluster routing. A case study for a wireless rechargeable sensor network has been carried out in MATLAB to assess the performance of the suggested design. The outcomes of the simulation show that the suggested technique was successful in extending the network’s lifetime. Based on the simulation results, compared to the genetic algorithm, the proposed algorithm has been able to reduce total energy consumption, total distance during the tour, and total travel delay by 26%, 17.2%, and 25.4%, respectively.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Samiksha, Chougule, Patil Shweta, and G. Tandale Prashant. "5G Wireless Systems in the Future." International Journal of Multidisciplinary Research Transactions 4, no. 6 (September 20, 2022): 37–44. https://doi.org/10.5281/zenodo.7096863.

Testo completo
Abstract (sommario):
Future 5G wireless networks will face new challenges, including increasing demand for network capacity to support a large number of devices running applications that require high data rates and always-on connectivity; as well as supporting emerging business models in the wireless network market that require networks to be more open. New issues necessitate new solutions, including revised network location, administration, and operation plans for future 5G wireless networks that are comparable to current wireless networks. One of the main goals of future 5G wireless networks is to provide compliantly customised networks to a wide range of users. one of the main goals of future 5G wireless networks is to give service customised networks to a wide range of services using integrated cloud reserves and wireless/wired network assets, which may be provided by a variety of infrastructure suppliers and/or operators. Future, 5G, Wireless, Capacity, Future.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Wireless networks"

1

Gaddam, Nishanth. "Network coding in wireless networks." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1468982.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Jiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.

Testo completo
Abstract (sommario):
Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow identity, etc.) from internal and external eavesdroppers such that important information cannot be deduced from it for malicious use. It is one of the most challenging security requirements to meet in computer networks. Existing camouflaging techniques such as traffic padding, MIX-net, etc., incur significant performance degradation when protected networks are wireless networks, such as sensor networks and mobile ad hoc networks. The reason is that wireless networks are typically subject to resource constraints (e.g. bandwidth, power supply) and possess some unique characteristics (e.g. broadcast, node mobility) that traditional wired networks do not possess. This necessitates developing new techniques that take account of properties of wireless networks and are able to achieve a good balance between performance and security. In this three-part dissertation we investigate techniques for providing network camouflaging services in wireless networks. In the first part, we address a specific problem in a hierarchical multi-task sensor network, i.e. hiding the links between observable traffic patterns and user interests. To solve the problem, a temporally constant traffic pattern, called cover traffic pattern, is needed. We describe two traf- fic padding schemes that implement the cover traffic pattern and provide algorithms for achieving the optimal energy efficiencies with each scheme. In the second part, we explore the design of a MIX-net based anonymity system in mobile ad hoc networks. The objective is to hide the source-destination relationship with respect to each connection. We survey existing MIX route determination algorithms that do not account for dynamic network topology changes, which may result in high packet loss rate and large packet latency. We then introduce adaptive algorithms to overcome this problem. In the third part, we explore the notion of providing anonymity support at MAC layer in wireless networks, which employs the broadcast property of wireless transmission. We design an IEEE 802.11-compliant MAC protocol that provides receiver anonymity for unicast frames and offers better reliability than pure broadcast protocol.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kim, MinJi Ph D. Massachusetts Institute of Technology. "Network coding for robust wireless networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71276.

Testo completo
Abstract (sommario):
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student submitted PDF version of thesis.<br>Includes bibliographical references (p. 157-167).<br>Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth and strict delay requirements of future applications. Wireless networks suffer from frequent losses and low throughput. We aim to provide designs for robust wireless networks. This dissertation presents protocols and algorithms that significantly improve wireless network performance and effectively overcome interference, erasures, and attacks. The key idea behind this dissertation is in understanding that wireless networks are fundamentally different from wired networks, and recognizing that directly applying techniques from wired networks to wireless networks limits performance. The key ingredient underlying our algorithms and protocols is network coding. By recognizing the algebraic nature of information, network coding breaks the convention of routing networks, and allows mixing of information in the intermediate nodes and routers. This mixing has been shown to have numerous performance benefits, e.g. increase in throughput and robustness against losses and failures. We present three protocols and algorithms, each using network coding to harness a different characteristic of the wireless medium. We address the problem of interference, erasures, and attacks in wireless networks with the following network coded designs. -- Algebraic NC exploits strategic interference to provide a distributed, randomized code construction for multi-user wireless networks. Network coding framework simplifies the multi-user wireless network model, and allows us to describe the multi-user wireless networks in an algebraic framework. This algebraic framework provides a randomized, distributed code construction, which we show achieves capacity for multicast connections as well as a certain set of non-multicast connections. -- TCP/NC efficiently and reliably delivers data over unreliable lossy wireless networks. TCP, which was designed for reliable transmission over wired networks, often experiences severe performance degradation in wireless networks. TCP/NC combines network coding's erasure correction capabilities with TCP's congestion control mechanism and reliability. We show that TCP/NC achieves significantly higher throughput than TCP in lossy networks; therefore, TCP/NC is well suited for reliable communication in lossy wireless networks. -- Algebraic Watchdog takes advantage of the broadcast nature of wireless networks to provide a secure global self-checking network. Algebraic Watchdog allows nodes to detect malicious behaviors probabilistically, and police their neighbors locally using overheard messages. Unlike traditional detection protocols which are receiver-based, this protocol gives the senders an active role in checking the nodes downstream. We provide a trellis-based inference algorithm and protocol for detection, and analyze its performance. The main contribution of this dissertation is in providing algorithms and designs for robust wireless networks using network coding. We present how network coding can be applied to overcome the challenges of operating in wireless networks. We present both analytical and simulation results to support that network coded designs, if designed with care, can bring forth significant gains, not only in terms of throughput but also in terms of reliability, security, and robustness.<br>by MinJi Kim.<br>Ph.D.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Attar, Hani Hasan. "Cooperative Network Coding for wireless networks." Thesis, University of Strathclyde, 2011. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=16782.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Nerini, Matteo. "Network Slicing for IEEE 802.11 Wireless Networks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21149/.

Testo completo
Abstract (sommario):
Future networks will pave the way for a myriad of applications with different requirements. In such a context, the today’s one-size-fits-all approach will not be able to efficiently address the different demands that verticals impose in terms of QoS and involved data volumes. To this end, network slicing is a new network paradigm which may provide the needed flexibility. It allows to offer multiple logical networks over a common infrastructure, tailored to the services which run on the network. In today’s Wi-Fi networks, all the users are connected to the same wireless channel, which allows service differentiation only at the traffic level. Thus, in this study, we propose a standard-compliant network slicing approach for the radio access segment of Wi-Fi, often neglected by the literature on network slicing. We present two algorithms to realize network slicing at the access level. The first assigns resources according to the requirements of the slices in a static way. On the other hand, the second, more advanced, dynamically configures the slices according to the network conditions and relevant KPIs. These techniques can be applied to the IEEE 802.11 standard and, in general, to all the protocols that use Carrier Sensing Multiple Access (CSMA) as channel access technique. The proposed algorithms were validated through extensive simulations, conducted with ns-3 network simulator and accompanied by theoretical calculations. Particular attention, often neglected in similar simulation-based works, has been paid to the electromagnetic properties of the spectrum, which play a fundamental role in radio communications. From the conducted simulations, we found that our slicing approaches largely outperform the today’s Wi-Fi access technique. They allow to reach higher goodput (i.e. a lower error probability) and lower latency, when needed. At the same time, tailored slicing saves energy to low-power devices and increases the spectrum efficiency.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Testo completo
Abstract (sommario):
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due to the absence of secure memory management in the current sensor hardware, the attacker could inject malicious code into the program flash by exploiting buffer overflow In the memory despite the secure code dissemination. The contribution of this thesis Is to provide two software-based security protocols and one hardware-based remote attestation protocol for network programming application. Our first protocol deploys multiple one-way key chains for a multi-hop sensor network. The scheme Is shown to be lower In computational, power consumption and communication costs yet still able to secure multi??hop propagation of program images. Our second protocol utilizes an Iterative hash structure to the data packets in network programming application, ensuring the data confidentiality and authenticity. In addition, we Integrated confidentiality and DoS-attack-resistance in a multi??hop code dissemination protocol. Our final solution is a hardware-based remote attestation protocol for verification of running codes on sensor nodes. An additional piece of tamper-proof hardware, Trusted Platform Module (TPM), is imposed into the sensor nodes. It secures the sensitive information (e.g., the session key) from attackers and monitors any platform environment changes with the Internal registers. With these features of TPM, the code Injection attack could be detected and removed when the contaminated nodes are challenged in our remote attestation protocol. We implement the first two software-based protocols with Deluge as the reference network programming protocol in TinyOS, evaluate them with the extensive simulation using TOSSIM and validate the simulation results with experiments using Tmote. We implement the remote attestation protocol on Fleck, a sensor platform developed by CSIRO that Integrates an Atmel TPM chip.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Hildebrand, Matthias. "Optimized network access in heterogeneous wireless networks." Kassel : Kassel Univ. Press, 2005. http://deposit.d-nb.de/cgi-bin/dokserv?idn=977677540.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Shi, Xiaomeng Ph D. Massachusetts Institute of Technology. "Energy aware network coding in wireless networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78533.

Testo completo
Abstract (sommario):
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 97-104).<br>Energy is one of the most important considerations in designing reliable low-power wireless communication networks. We focus on the problem of energy aware network coding. In particular, we investigate practical energy efficient network code design for wireless body area networks (WBAN). We first consider converge-cast in a star-shaped topology, in which a central base station (BS), or hub, manages and communicates directly with a set of nodes. We then consider a wireless-relay channel, in which a relay node assists in the transmission of data from a source to a destination. This wireless relay channel can be seen as a simplified extended star network, where nodes have relay capabilities. The objective is to investigate the use of network coding in these scenarios, with the goal of achieving reliability under low-energy and lower-power constraints. More specifically, in a star network, we propose a simple network layer protocol, study the mean energy to complete uploads of given packets from the nodes to the BS using a Markov chain model, and show through numerical examples that when reception energy is taken into account, the incorporation of network coding offers reductions in energy use. The amount of achievable gains depends on the number of nodes in the network, the degree of asymmetry in channel conditions experienced by different nodes, and the relative difference between transmitting and receiving power at the nodes. We also demonstrate the compatibility of the proposed scheme with the IEEE 802.15.6 WBAN standard by describing ways of incorporating network coding into systems compliant to the standard. For a wireless relay channel, we explore the strategic use of network coding according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. Although we do not attempt to explicitly categorize the optimal network coding strategies in the relay channel under different system parameters, we provide a framework for deciding whether and where to code, taking into account of throughput maximization and energy depletion constraints.<br>by Xiaomeng Shi.<br>Ph.D.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Rastogi, Preeti. "Assessing Wireless Network Dependability Using Neural Networks." Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1129134364.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Taiwo, Olugbenga Adekunle. "Network access selection in heterogeneous wireless networks." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/16832.

Testo completo
Abstract (sommario):
In heterogeneous wireless networks (HWNs), both single-homed and multi-homed terminals are supported to provide connectivity to users. A multiservice single-homed multi-mode terminal can support multiple types of services, such as voice call, file download and video streaming simultaneously on any one of the available radio access technologies (RATs) such as Wireless Local Area Network (WLAN), and Long Term Evolution (LTE). Consequently, a single-homed multi-mode terminal having multiple on-going calls may need to perform a vertical handover from one RAT to another. One of the major issues in HWNs is how to select the most suitable RAT for multiple handoff calls, and the selection of a suitable RAT for multiple-calls from a single-homed multi-mode terminal in HWNs is a group decision problem. This is because a single-homed multi-mode terminal can connect to only one RAT at a time, and therefore multiple handoff calls from the terminal have to be handed over to the same RAT. In making group decision for multiple-calls, the quality of service (QoS) requirements for individual calls needs to be considered. Thus, the RAT that most satisfies the QoS requirements of individual calls is selected as the most suitable RAT for the multiple-calls. Whereas most research efforts in HWNs have concentrated on developing vertical handoff decision schemes for a single call from a multi-mode terminal, not much has been reported in the literature on RAT-selection for multiple-calls from a single-homed multi-mode terminal in next generation wireless networks (NGWNs). In addition, not much has been done to investigate the sensitivity of RAT-selection criteria for multiple-calls in NGWNs. Therefore, this dissertation addresses these issues by focusing on following two main aspects: (1) comparative analysis of four candidate multi-criteria group decision-making (MCGDM) schemes that could be adapted for making RAT-selection decisions for multiple-calls, and (2) development of a new RAT-selection scheme named the consensus RAT-selection model. In comparative analysis of the candidate RAT-selection schemes, four MCGDM schemes namely: distance to the ideal alternative-group decision making (DIA-GDM), multiplicative exponent weighting-group decision making (MEW-GDM), simply additive weighting-group decision making (SAW-GDM), technique for order preference by similarity to Ideal solution-group decision making (TOPSIS-GDM) are considered. The performance of the multiple-calls RAT-selection schemes is evaluated using the MATLAB simulation tool. The results show that DIA-GDM and TOPSIS-GDM schemes are more suitable for multiple handoff calls than SAW-GDM and MEW-GDM schemes. This is because they are consistent and less-sensitive in making RAT-selection decision than the other two schemes, with regards to RAT-selection criteria (service price, data rate, security, battery power consumption and network delay) in HWNs. In addition, the newly developed RAT-selection scheme incorporates RAT-consensus level for improving RAT-selection decisions for multiple-calls. Numerical results conducted in MATLAB validate the effectiveness and performance of the newly proposed RAT-selection scheme for multiple-calls in HWNs.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Wireless networks"

1

Association for Computing Machinery. Wireless networks. Amsterdam: Baltzer Science Publishers, 1995.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

P, Nicopolitidis, ed. Wireless networks. New York: J. Wiley, 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Dearden, James. Wireless networks. Manchester: JISC, 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Jahankhani, Hamid, and Ayman El Hajjar, eds. Wireless Networks. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33631-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Pahlavan, Kaveh. Wireless information networks. New York: Wiley, 1995.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cui, Li, and Xiaolan Xie, eds. Wireless Sensor Networks. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8174-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Fitzek, Frank H. P., and Marcos D. Katz, eds. Cognitive Wireless Networks. Dordrecht: Springer Netherlands, 2007. http://dx.doi.org/10.1007/978-1-4020-5979-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Selmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hossain, Ekram, and Kin Leung, eds. Wireless Mesh Networks. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68839-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Holtzman, Jack M., ed. Wireless Information Networks. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4613-1353-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "Wireless networks"

1

Ye, Qiang, and Wen Wu. "Network Slicing for 5G Networks and Beyond." In Wireless Networks, 17–33. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Peng, Mugen, Zhongyuan Zhao, and Yaohua Sun. "Flexible Network Management in Fog Radio Access Networks." In Wireless Networks, 85–104. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50735-0_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Wireless Networks." In Computernetze und Internet of Things, 91–115. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cowley, John. "Wireless Networks." In Communications and Networking, 187–99. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

El-Bendary, Mohsen A. M. "Wireless Networks." In Lecture Notes in Electrical Engineering, 43–55. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-55069-3_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Kao, Ming-Yang. "Wireless Networks." In Encyclopedia of Algorithms, 1032. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-30162-4_482.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Robertazzi, Thomas G. "Wireless Networks." In Introduction to Computer Networking, 35–60. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Meroth, Ansgar, and Petre Sora. "Wireless Networks." In Sensor networks in theory and practice, 313–43. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-39576-6_13.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Nilsson, Fredrik. "Wireless networks." In Intelligent Network Video, 193–205. 3rd ed. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.4324/9781003412205-11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Robertazzi, Thomas. "Wireless Networks." In Basics of Computer Networking, 29–43. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-2104-7_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Wireless networks"

1

Barry, Liam, Amol Delmade, Simon Nellen, David Coffey, Cristian Vargas, Alison Kearney, Robert Kohlhaas, Martin Schell, and Frank Smyth. "Enabling Sub-THz 6G Wireless Systems Using Photonic Technologies." In Photonic Networks and Devices, NeTh1C.2. Washington, D.C.: Optica Publishing Group, 2024. https://doi.org/10.1364/networks.2024.neth1c.2.

Testo completo
Abstract (sommario):
The key elements of an optical heterodyne analog radio-over-fiber link, i.e. optical source, detector technology and impairment compensation techniques, are analyzed for high frequency (180-260 GHz) sub-THz signal generation in 6G wireless systems Full-text article not available; see video presentation
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Guan, Shan, Brett M. Tossey, and Francois Ayello. "Assessing Pipe Integrity Using Wireless Sensor Networks and Bayesian Network Modelling." In CORROSION 2019, 1–10. NACE International, 2019. https://doi.org/10.5006/c2019-13036.

Testo completo
Abstract (sommario):
Abstract The power generation industry is seeking solutions to prevent failures in high energy piping systems including main steam and hot reheat steam pipelines. A thorough review of prior failures in these systems has shown that 60-70% of all failures can be attributed to hanger and strain monitoring systems not performing within specification for extended periods of times (typically 1-5 years). The typical failure mode has been creep in seam welds. The consequence of failure for high energy piping can be severe and the effect of unexpected or unknown displacements cannot be quantified when estimating remaining life. In this case study, we developed wireless LIDAR sensor networks that can be installed on either hangers or above insulation on these piping systems. The purpose of the sensor network is to protect life, property, and environment by reducing the likelihood catastrophic failures of high energy piping. The wireless sensors would communicate with the central control system at a power station and alert plant staff when the piping strain / bulk displacement is outside of design limits. A Bayesian network (BN) model was created which links the piping displacement to the remaining creep life predicted based on API(1) 579-1 “Fitness-For-Service”. Therefore, by knowing real-time pipe displacement measured using wireless sensor network, the remaining creep life can be dynamically predicted though the Bayesian network model.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

QasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.

Testo completo
Abstract (sommario):
All the world now is depending on networks to share information between the users, where different data types are transferred wirelessly from network to network. Using wireless LANs are important to connect the users and share the data, these Wireless LANs have different types of obstacles that affect the data sharing or the wireless signal, such as, compatibility wireless protocol types, range coverage, walls penetration, moving devices, different routing protocols, data transferred types, weak signal, and many more. In this paper a practical analysis will be made to the latest IEEE 802.11ax wireless protocol to be compared with two types of Wi-Fi booster’s networks, Mesh and Extender Wi-Fi, while transferring 4k video size data rate, inside a room and on different rooms for wall penetration analysis, while measuring the throughput, delay, and signal strength metrics. The main importance of this paper is to give a more practical understanding and avoid the main problems of using the wireless protocol 802.11ax in different network types.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Bhuiyan, Rashed Hossain, MD Mazharul Islam, and Haiying Huang. "Wireless Excitation and Electrical Impedance Matching of Piezoelectric Wafer Active Sensors." In ASME 2012 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/smasis2012-8210.

Testo completo
Abstract (sommario):
Wireless ultrasound inspections using Piezoelectric Wafer Active Sensors (PWAS) are attractive for Structural Health Monitoring (SHM). However, the impedance mismatch between the PWAS and the wireless transponder reduces the wirelessly transmitted signal strength. Electrical Impedance Matching (EIM) circuit can be introduced to maximize the power transmission between the PWAS and the wireless transponder. This paper discusses the wireless excitation of ultrasound as well as the design, simulation, and characterization of the EIM networks for PWAS. To maximize power transmission, a two port EIM network was developed using a computerized smith chart. The equivalent circuit of the PWAS and the EIM network were then combined to establish the equivalent circuit of the matched transducer. Computer simulations were carried out to evaluate the gain, the bandwidth, and the sensitivity of the EIM networks. Two-port EIM networks were implemented for both the actuator and the sensor in an ultrasound pitch-catch inspection system. The performance of the pitch-catch systems with and without the EIM networks was compared. Detailed analysis, simulation, hardware implementation, and measurement results are presented.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Abaszada, Elvin. "Studies some Aspects Information Security of Wireless Communication Networks." In 2nd International Scientific-Practical Conference "Machine Building and Energy: New Concepts and Technologies". Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-n0hgrv.

Testo completo
Abstract (sommario):
The efficiency of the functioning wireless cellular networks using modern information and computer technologies is analyzed. The constituent technical components of the vector quality of functioning of a wireless network segment in the event of a threat to the security of a telecommunication system and eliminating the threat of vulnerability have been studied. Some aspects information security of wireless cellular networks are considered from the point view of the characteristics information protection system and the reliability of the communication network.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Testo completo
Abstract (sommario):
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Lim, Christina, Tingting Song, and Ampalavanapillai Nirmalathas. "Signal Space Diversity Techniques for Indoor Optical Wireless Systems." In Photonic Networks and Devices. Washington, D.C.: Optica Publishing Group, 2023. http://dx.doi.org/10.1364/networks.2023.nem4b.2.

Testo completo
Abstract (sommario):
Line-of-sight optical wireless communication systems have emerged as a potential candidate for indoor ultra-high-speed communication. However, the link performance is subjected to physical shadowing. In this paper, we review our work on signal space diversity to improve the impact of shadowing for high-speed indoor optical wireless communication.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Paavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.

Testo completo
Abstract (sommario):
Wireless communications are rapidly taking an important role in factory environment. The current Wi-Fi technologies struggle to meet the requirements of industrial factories, for example with regard to latency and security. The emerging 5G communication networks are the first networks expected to meet such requirements. Private networks are owned by the factories themselves. Private networks can utilize 5G technologies to tailor the networks to meet the exact demands within the factory environment and guarantee that the factories can use the whole bandwidth for their own use. This concurrently increases the data security as the data does not need to be deliveved over public networks. This paper describes the latest developments in 5G with regard to private networks and Industry 4.0, which is the name given to the digitalization, automatization and data exchange trend currently ongoing in factory environments. In this paper we describe a private cellular network we have installed inside a factory building. This network has been trialed with wireless pyrometer measurement data transmission and environmental surveillance of a measurement laboratory. This paper analyses the suitability of private networks for these use cases and discusses in general which applications would benefit the most from private wireless networks.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Boualem, Adda, Marwane Ayaida, Hichem Sedjelmaci, ChaimaA Khalfi, Kamilia Brahimi, Bochra Khelil, and Sanaa Bouchama. "A New Classification of Clustering-Based for Different Problems in Different Wireless AD-HOC Networks." In 5th International Conference on Advanced Natural Language Processing. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141010.

Testo completo
Abstract (sommario):
Ad-hoc networks are specifically designed to facilitate communication in environments where establishing a dedicated network infrastructure is exceedingly complex or impractical. The integration of clustering concepts into various ad-hoc network scenarios, including Wireless Sensor Networks (WSN), Mobile Ad-hoc Networks (MANET), Vehicular Ad-hoc Networks (VANET), Delay-Tolerant Networks (DTN), Wireless Ad-hoc Networks (WANET), Underwater Wireless Sensor Networks (UWSN), Unmanned Aerial Vehicle Networks (UAV), commonly known as "drones," Space Networks (SN), and Satellite Networks (TN), presents abundant opportunities for refining strategies in event tracking and area monitoring across both deterministic and uncertain environments. This paper conducts a comparative analysis of diverse proposed strategies leveraging clustering concepts to address coverage challenges within deterministic and uncertain environments. As a result, it addresses current and future challenges inherent in clustering-based WANET, elucidating the merits, shortcomings, and weaknesses of clustering models. Lastly, it identifies potential avenues for addressing coverage issues in existing and emerging technologies.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Kaur, Harminder, and Sharvan Kumar Pahuja. "MAC Protocols for Wireless Body Sensor Network." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.33.

Testo completo
Abstract (sommario):
Wireless Body Area Networks, also known as the Wireless Body Sensor Networks, provides the monitoring of the health parameters in remote areas and where the medical facility is not available. Wireless Body Sensor Networks contains the body or placement of the sensors on body for measuring the medical and non-medical parameters. These networks share the wireless medium for the transmission of the data from one place to another. So the design of Medium Access Control is a challenging task for the WBSNs due to wireless media for less energy consumption and mobility. Various MAC protocols are designed to provide less energy consumption and improve the network lifetime. This paper presents the study of these existing MAC layer protocols based on different QoS parameters that define the network quality.
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Wireless networks"

1

Kabara, Joseph, Prashant Krishnamurthy, and David Tipper. Information Assurance in Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2001. http://dx.doi.org/10.21236/ada408305.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Konorski, Jerzy. Information Transfer Ion Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada525850.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Chandrakasan, Anantha P. Power Aware Wireless Microsensor Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada415425.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Sivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2001. http://dx.doi.org/10.21236/ada400626.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cooper, Jason, Manish Karir, and John S. Baras. Data Dependent Keying for Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada440782.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada442751.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

TORGERSON, MARK D., and BRIAN P. VAN LEEUWEN. Routing Data Authentication in Wireless Networks. Office of Scientific and Technical Information (OSTI), October 2001. http://dx.doi.org/10.2172/787792.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada404365.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Stamatiou, Kostas, John G. Proakis, and James R. Zeidler. Spatial Multiplexing in Random Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada515877.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!