Gotowa bibliografia na temat „Wireless networks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Wireless networks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Wireless networks"
THATIPAMULA RAJU, THATIPAMULA RAJU, i D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks". International Journal of Scientific Research 2, nr 8 (1.06.2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.
Pełny tekst źródłaGurnule, Pranjali V. "Wireless Jamming Networks". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 1931–35. http://dx.doi.org/10.31142/ijtsrd14455.
Pełny tekst źródłaNavya, B., i M. Ankitha. "Wireless Sensor Networks". International Journal of Research Publication and Reviews 5, nr 3 (9.03.2024): 3875–77. http://dx.doi.org/10.55248/gengpi.5.0324.0767.
Pełny tekst źródłaHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks". Webology 19, nr 1 (20.01.2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Pełny tekst źródłaMishra, Saurabh, Prof Rakesh Ranjan, Dr Sonika Singh i Dr Gagan Singh. "Performance Analysis of MIMO Heterogeneous Wireless Sensor Networks". International Journal of Innovative Technology and Exploring Engineering 12, nr 12 (30.11.2023): 25–31. http://dx.doi.org/10.35940/ijitee.l9742.11121223.
Pełny tekst źródłaKrishna, K. Hari, Y. Suresh Babu i Tapas Kumar. "Wireless Network Topological Routing in Wireless Sensor Networks". Procedia Computer Science 79 (2016): 817–26. http://dx.doi.org/10.1016/j.procs.2016.03.111.
Pełny tekst źródłaWang, Xinheng. "Wireless mesh networks". Journal of Telemedicine and Telecare 14, nr 8 (grudzień 2008): 401–3. http://dx.doi.org/10.1258/jtt.2008.008003.
Pełny tekst źródłaHabibi, Payman, Goran Hassanifard, Abdulbaghi Ghaderzadeh i Arez Nosratpour. "Offering a Demand-Based Charging Method Using the GBO Algorithm and Fuzzy Logic in the WRSN for Wireless Power Transfer by UAV". Journal of Sensors 2023 (2.05.2023): 1–19. http://dx.doi.org/10.1155/2023/6326423.
Pełny tekst źródłaMa, De Xin, Jian Ma, Peng Min Xu, Cai Xia Song i Ying Pang. "Solar-Powered Wireless Sensor Network’s Energy Gathering Technology". Applied Mechanics and Materials 477-478 (grudzień 2013): 396–99. http://dx.doi.org/10.4028/www.scientific.net/amm.477-478.396.
Pełny tekst źródłaSaluja, Arleen, Pruthikrai Mahatanankoon i Tibor Gyires. "Users' Perceptions of Wireless Networks Usage". International Journal of Interdisciplinary Telecommunications and Networking 2, nr 2 (kwiecień 2010): 67–78. http://dx.doi.org/10.4018/jitn.2010040105.
Pełny tekst źródłaRozprawy doktorskie na temat "Wireless networks"
Gaddam, Nishanth. "Network coding in wireless networks". [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1468982.
Pełny tekst źródłaJiang, Shu. "Efficient network camouflaging in wireless networks". Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.
Pełny tekst źródłaKim, MinJi Ph D. Massachusetts Institute of Technology. "Network coding for robust wireless networks". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71276.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 157-167).
Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth and strict delay requirements of future applications. Wireless networks suffer from frequent losses and low throughput. We aim to provide designs for robust wireless networks. This dissertation presents protocols and algorithms that significantly improve wireless network performance and effectively overcome interference, erasures, and attacks. The key idea behind this dissertation is in understanding that wireless networks are fundamentally different from wired networks, and recognizing that directly applying techniques from wired networks to wireless networks limits performance. The key ingredient underlying our algorithms and protocols is network coding. By recognizing the algebraic nature of information, network coding breaks the convention of routing networks, and allows mixing of information in the intermediate nodes and routers. This mixing has been shown to have numerous performance benefits, e.g. increase in throughput and robustness against losses and failures. We present three protocols and algorithms, each using network coding to harness a different characteristic of the wireless medium. We address the problem of interference, erasures, and attacks in wireless networks with the following network coded designs. -- Algebraic NC exploits strategic interference to provide a distributed, randomized code construction for multi-user wireless networks. Network coding framework simplifies the multi-user wireless network model, and allows us to describe the multi-user wireless networks in an algebraic framework. This algebraic framework provides a randomized, distributed code construction, which we show achieves capacity for multicast connections as well as a certain set of non-multicast connections. -- TCP/NC efficiently and reliably delivers data over unreliable lossy wireless networks. TCP, which was designed for reliable transmission over wired networks, often experiences severe performance degradation in wireless networks. TCP/NC combines network coding's erasure correction capabilities with TCP's congestion control mechanism and reliability. We show that TCP/NC achieves significantly higher throughput than TCP in lossy networks; therefore, TCP/NC is well suited for reliable communication in lossy wireless networks. -- Algebraic Watchdog takes advantage of the broadcast nature of wireless networks to provide a secure global self-checking network. Algebraic Watchdog allows nodes to detect malicious behaviors probabilistically, and police their neighbors locally using overheard messages. Unlike traditional detection protocols which are receiver-based, this protocol gives the senders an active role in checking the nodes downstream. We provide a trellis-based inference algorithm and protocol for detection, and analyze its performance. The main contribution of this dissertation is in providing algorithms and designs for robust wireless networks using network coding. We present how network coding can be applied to overcome the challenges of operating in wireless networks. We present both analytical and simulation results to support that network coded designs, if designed with care, can bring forth significant gains, not only in terms of throughput but also in terms of reliability, security, and robustness.
by MinJi Kim.
Ph.D.
Attar, Hani Hasan. "Cooperative Network Coding for wireless networks". Thesis, University of Strathclyde, 2011. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=16782.
Pełny tekst źródłaNerini, Matteo. "Network Slicing for IEEE 802.11 Wireless Networks". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21149/.
Pełny tekst źródłaTan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks". Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Pełny tekst źródłaHildebrand, Matthias. "Optimized network access in heterogeneous wireless networks". Kassel : Kassel Univ. Press, 2005. http://deposit.d-nb.de/cgi-bin/dokserv?idn=977677540.
Pełny tekst źródłaShi, Xiaomeng Ph D. Massachusetts Institute of Technology. "Energy aware network coding in wireless networks". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78533.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 97-104).
Energy is one of the most important considerations in designing reliable low-power wireless communication networks. We focus on the problem of energy aware network coding. In particular, we investigate practical energy efficient network code design for wireless body area networks (WBAN). We first consider converge-cast in a star-shaped topology, in which a central base station (BS), or hub, manages and communicates directly with a set of nodes. We then consider a wireless-relay channel, in which a relay node assists in the transmission of data from a source to a destination. This wireless relay channel can be seen as a simplified extended star network, where nodes have relay capabilities. The objective is to investigate the use of network coding in these scenarios, with the goal of achieving reliability under low-energy and lower-power constraints. More specifically, in a star network, we propose a simple network layer protocol, study the mean energy to complete uploads of given packets from the nodes to the BS using a Markov chain model, and show through numerical examples that when reception energy is taken into account, the incorporation of network coding offers reductions in energy use. The amount of achievable gains depends on the number of nodes in the network, the degree of asymmetry in channel conditions experienced by different nodes, and the relative difference between transmitting and receiving power at the nodes. We also demonstrate the compatibility of the proposed scheme with the IEEE 802.15.6 WBAN standard by describing ways of incorporating network coding into systems compliant to the standard. For a wireless relay channel, we explore the strategic use of network coding according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. Although we do not attempt to explicitly categorize the optimal network coding strategies in the relay channel under different system parameters, we provide a framework for deciding whether and where to code, taking into account of throughput maximization and energy depletion constraints.
by Xiaomeng Shi.
Ph.D.
Rastogi, Preeti. "Assessing Wireless Network Dependability Using Neural Networks". Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1129134364.
Pełny tekst źródłaTaiwo, Olugbenga Adekunle. "Network access selection in heterogeneous wireless networks". Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/16832.
Pełny tekst źródłaKsiążki na temat "Wireless networks"
Association for Computing Machinery. Wireless networks. Amsterdam: Baltzer Science Publishers, 1995.
Znajdź pełny tekst źródłaDearden, James. Wireless networks. Manchester: JISC, 1997.
Znajdź pełny tekst źródłaJahankhani, Hamid, i Ayman El Hajjar, red. Wireless Networks. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33631-7.
Pełny tekst źródłaPahlavan, Kaveh. Wireless information networks. New York: Wiley, 1995.
Znajdź pełny tekst źródłaDaniel, Collins, red. 3G wireless networks. Wyd. 2. New York: McGraw-Hill, 2007.
Znajdź pełny tekst źródłaCui, Li, i Xiaolan Xie, red. Wireless Sensor Networks. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8174-5.
Pełny tekst źródłaFitzek, Frank H. P., i Marcos D. Katz, red. Cognitive Wireless Networks. Dordrecht: Springer Netherlands, 2007. http://dx.doi.org/10.1007/978-1-4020-5979-7.
Pełny tekst źródłaSelmic, Rastko R., Vir V. Phoha i Abdul Serwadda. Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6.
Pełny tekst źródłaHossain, Ekram, i Kin Leung, red. Wireless Mesh Networks. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68839-8.
Pełny tekst źródłaHoltzman, Jack M., red. Wireless Information Networks. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4613-1353-3.
Pełny tekst źródłaCzęści książek na temat "Wireless networks"
Ye, Qiang, i Wen Wu. "Network Slicing for 5G Networks and Beyond". W Wireless Networks, 17–33. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_2.
Pełny tekst źródłaPeng, Mugen, Zhongyuan Zhao i Yaohua Sun. "Flexible Network Management in Fog Radio Access Networks". W Wireless Networks, 85–104. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50735-0_5.
Pełny tekst źródłaBök, Patrick-Benjamin, Andreas Noack, Marcel Müller i Daniel Behnke. "Wireless Networks". W Computernetze und Internet of Things, 91–115. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_4.
Pełny tekst źródłaCowley, John. "Wireless Networks". W Communications and Networking, 187–99. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_10.
Pełny tekst źródłaEl-Bendary, Mohsen A. M. "Wireless Networks". W Lecture Notes in Electrical Engineering, 43–55. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-55069-3_3.
Pełny tekst źródłaKao, Ming-Yang. "Wireless Networks". W Encyclopedia of Algorithms, 1032. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-30162-4_482.
Pełny tekst źródłaRobertazzi, Thomas G. "Wireless Networks". W Introduction to Computer Networking, 35–60. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_4.
Pełny tekst źródłaRobertazzi, Thomas. "Wireless Networks". W Basics of Computer Networking, 29–43. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-2104-7_4.
Pełny tekst źródłaSadiku, Matthew N. O., i Cajetan M. Akujuobi. "Wireless Networks". W Fundamentals of Computer Networks, 115–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09417-0_10.
Pełny tekst źródłaJha, Vikas Kumar, Bishwajeet Pandey i Ciro Rodriguez Rodriguez. "Wireless Networks". W Network Evolution and Applications, 99–119. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003302902-6.
Pełny tekst źródłaStreszczenia konferencji na temat "Wireless networks"
QasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments". W 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.
Pełny tekst źródłaAbaszada, Elvin. "Studies some Aspects Information Security of Wireless Communication Networks". W 2nd International Scientific-Practical Conference "Machine Building and Energy: New Concepts and Technologies". Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-n0hgrv.
Pełny tekst źródłaBhuiyan, Rashed Hossain, MD Mazharul Islam i Haiying Huang. "Wireless Excitation and Electrical Impedance Matching of Piezoelectric Wafer Active Sensors". W ASME 2012 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/smasis2012-8210.
Pełny tekst źródłaJ. Grahn, Kaj, Göran Pulkkis i Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks". W 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.
Pełny tekst źródłaLim, Christina, Tingting Song i Ampalavanapillai Nirmalathas. "Signal Space Diversity Techniques for Indoor Optical Wireless Systems". W Photonic Networks and Devices. Washington, D.C.: Optica Publishing Group, 2023. http://dx.doi.org/10.1364/networks.2023.nem4b.2.
Pełny tekst źródłaPaavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara i Tero Jokela. "Use of wireless communication networks in digitalization of factory environments". W CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.
Pełny tekst źródłaSegura, Gustavo A. Nunez, Arsenia Chorti i Cíntia Borges Margi. "IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks". W Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.
Pełny tekst źródłaKaur, Harminder, i Sharvan Kumar Pahuja. "MAC Protocols for Wireless Body Sensor Network". W International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.33.
Pełny tekst źródłaMadhag, Aqeel, i Jongeun Choi. "Distributed Navigation Strategy of Mobile Sensor Networks With Probabilistic Wireless Communication Links". W ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9964.
Pełny tekst źródłaA., Maheswari. "Handover in 5G Heterogeneous Wireless Networks: A Comprehensive Review". W The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/qljv2039/ngcesi23p141.
Pełny tekst źródłaRaporty organizacyjne na temat "Wireless networks"
Kabara, Joseph, Prashant Krishnamurthy i David Tipper. Information Assurance in Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, wrzesień 2001. http://dx.doi.org/10.21236/ada408305.
Pełny tekst źródłaKonorski, Jerzy. Information Transfer Ion Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2010. http://dx.doi.org/10.21236/ada525850.
Pełny tekst źródłaChandrakasan, Anantha P. Power Aware Wireless Microsensor Networks. Fort Belvoir, VA: Defense Technical Information Center, maj 2003. http://dx.doi.org/10.21236/ada415425.
Pełny tekst źródłaFrankel, S. E., B. Eydt, L. Owens i K. A. Scarfone. Establishing wireless robust security networks :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.
Pełny tekst źródłaSivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, listopad 2001. http://dx.doi.org/10.21236/ada400626.
Pełny tekst źródłaCooper, Jason, Manish Karir i John S. Baras. Data Dependent Keying for Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2003. http://dx.doi.org/10.21236/ada440782.
Pełny tekst źródłaPursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2005. http://dx.doi.org/10.21236/ada442751.
Pełny tekst źródłaTORGERSON, MARK D., i BRIAN P. VAN LEEUWEN. Routing Data Authentication in Wireless Networks. Office of Scientific and Technical Information (OSTI), październik 2001. http://dx.doi.org/10.2172/787792.
Pełny tekst źródłaPursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2002. http://dx.doi.org/10.21236/ada404365.
Pełny tekst źródłaStamatiou, Kostas, John G. Proakis i James R. Zeidler. Spatial Multiplexing in Random Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2009. http://dx.doi.org/10.21236/ada515877.
Pełny tekst źródła