Artykuły w czasopismach na temat „Wireless networks”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Wireless networks.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Wireless networks”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

THATIPAMULA RAJU, THATIPAMULA RAJU, i D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks". International Journal of Scientific Research 2, nr 8 (1.06.2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Gurnule, Pranjali V. "Wireless Jamming Networks". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 1931–35. http://dx.doi.org/10.31142/ijtsrd14455.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Navya, B., i M. Ankitha. "Wireless Sensor Networks". International Journal of Research Publication and Reviews 5, nr 3 (9.03.2024): 3875–77. http://dx.doi.org/10.55248/gengpi.5.0324.0767.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks". Webology 19, nr 1 (20.01.2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Pełny tekst źródła
Streszczenie:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
Style APA, Harvard, Vancouver, ISO itp.
5

Mishra, Saurabh, Prof Rakesh Ranjan, Dr Sonika Singh i Dr Gagan Singh. "Performance Analysis of MIMO Heterogeneous Wireless Sensor Networks". International Journal of Innovative Technology and Exploring Engineering 12, nr 12 (30.11.2023): 25–31. http://dx.doi.org/10.35940/ijitee.l9742.11121223.

Pełny tekst źródła
Streszczenie:
Wireless Sensor Networks (WSN) are widely used in remote applications related to defence and healthcare. A network with nodes having different capabilities like sensing, various computational capabilities, power-efficient communication, and a varied sensing range is called a heterogeneous wireless sensor network. Heterogeneous wireless sensor networks using MIMO wireless channels are more useful for energy-efficient multi-channel communication. MIMO applications in wireless sensor networks have the potential to enhance throughput, reduce End-to-End Delay, improve packet delivery ratios, and conserve energy in wireless sensor networks. Its implementation needs to be carefully considered in light of the specific deployment conditions and resource constraints of the network, considering proper antenna design, synchronisation mechanisms, and energy-efficient algorithms. This paper presents a comparative performance analysis of MIMO wireless sensor networks and traditional wireless sensor networks without MIMO for various Quality of Service parameters like Packet Delivery Ratio, End to End Delay, Throughput and Residual energy. The research work shows that the application of MIMO in Wireless Sensor Networks enables sensor nodes to collaborate effectively, leading to improved reliability and coverage, and also increases the network's lifetime by conserving energy in resource-constrained sensor nodes through the preservation of Residual Energy.
Style APA, Harvard, Vancouver, ISO itp.
6

Krishna, K. Hari, Y. Suresh Babu i Tapas Kumar. "Wireless Network Topological Routing in Wireless Sensor Networks". Procedia Computer Science 79 (2016): 817–26. http://dx.doi.org/10.1016/j.procs.2016.03.111.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Xinheng. "Wireless mesh networks". Journal of Telemedicine and Telecare 14, nr 8 (grudzień 2008): 401–3. http://dx.doi.org/10.1258/jtt.2008.008003.

Pełny tekst źródła
Streszczenie:
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.
Style APA, Harvard, Vancouver, ISO itp.
8

Habibi, Payman, Goran Hassanifard, Abdulbaghi Ghaderzadeh i Arez Nosratpour. "Offering a Demand-Based Charging Method Using the GBO Algorithm and Fuzzy Logic in the WRSN for Wireless Power Transfer by UAV". Journal of Sensors 2023 (2.05.2023): 1–19. http://dx.doi.org/10.1155/2023/6326423.

Pełny tekst źródła
Streszczenie:
An extremely high number of geographically dispersed, energy-limited sensor nodes make up wireless sensor networks. One of the critical difficulties with these networks is their network lifetime. Wirelessly charging the sensors continuously is one technique to lengthen the network’s lifespan. In order to compensate for the sensor nodes’ energy through a wireless medium, a mobile charger (MC) is employed in wireless sensor networks (WRSN). Designing a charging scheme that best extends the network’s lifetime in such a situation is difficult. In this paper, a demand-based charging method using unmanned aerial vehicles (UAVs) is provided for wireless rechargeable sensor networks. In this regard, first, sensors are grouped according to their geographic position using the K-means clustering technique. Then, with the aid of a fuzzy logic system, these clusters are ranked in order of priority based on the parameters of the average percentage of battery life left in the sensor nodes’ batteries, the number of sensors, and critical sensors that must be charged, and the distance between each cluster’s center and the MC charging station. It then displays the positions of the UAV to choose the crucial sensor nodes using a routing algorithm based on the shortest and most vital path in each cluster. Notably, the gradient-based optimization (GBO) algorithm has been applied in this work for intracluster routing. A case study for a wireless rechargeable sensor network has been carried out in MATLAB to assess the performance of the suggested design. The outcomes of the simulation show that the suggested technique was successful in extending the network’s lifetime. Based on the simulation results, compared to the genetic algorithm, the proposed algorithm has been able to reduce total energy consumption, total distance during the tour, and total travel delay by 26%, 17.2%, and 25.4%, respectively.
Style APA, Harvard, Vancouver, ISO itp.
9

Ma, De Xin, Jian Ma, Peng Min Xu, Cai Xia Song i Ying Pang. "Solar-Powered Wireless Sensor Network’s Energy Gathering Technology". Applied Mechanics and Materials 477-478 (grudzień 2013): 396–99. http://dx.doi.org/10.4028/www.scientific.net/amm.477-478.396.

Pełny tekst źródła
Streszczenie:
We analyze the solar-powered wireless sensor network's energy gathering techniques, aiming to prolong the lifetime of wireless sensor network. We summarize wireless sensor network node's energy autonomy system, its characteristics in detail and new technology adopts, provides some suggestions and new ideas in the design and research of solar-powered wireless sensor networks.
Style APA, Harvard, Vancouver, ISO itp.
10

Saluja, Arleen, Pruthikrai Mahatanankoon i Tibor Gyires. "Users' Perceptions of Wireless Networks Usage". International Journal of Interdisciplinary Telecommunications and Networking 2, nr 2 (kwiecień 2010): 67–78. http://dx.doi.org/10.4018/jitn.2010040105.

Pełny tekst źródła
Streszczenie:
Wireless networks provide the most convenient way to access the Internet. This paper determines how the preliminary and advanced knowledge of wireless networks affect users’ perception and usage. Based on their knowledge, users develop certain emotional responses, which could affect their wireless network usage. This study identifies the effect of these emotional responses on users’ degree of use of wireless networks. Using data collected from 143 respondents, regression analyses reveal that wireless network usage is affected less by advanced wireless network knowledge and more by preliminary knowledge. The findings also show that the degree of usage depends on users’ ability to understand basic wireless network functionality and security. To motivate wireless usage, developers and designers of future wireless technologies do not need to overwhelm users with technical detail.
Style APA, Harvard, Vancouver, ISO itp.
11

Jabbari, B. "Wireless Networks". IEEE Communications Magazine 35, nr 8 (sierpień 1997): 28. http://dx.doi.org/10.1109/mcom.1997.606023.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Idan, Zainab S., i Ahmed Al-Fatlawi. "Energy Efficient Clustering Using Improved Particle Swarm Optimization in Wireless Sensor Networks". BIO Web of Conferences 97 (2024): 00106. http://dx.doi.org/10.1051/bioconf/20249700106.

Pełny tekst źródła
Streszczenie:
The Wireless Sensor Network (WSN) includes many low-cost nodes that have the capacity to perceive, operate, and communicate wirelessly. WSN can spread the information to all around through a cooperative node approach. It also has many advantages in terms of both cost and cooperative intelligence. In a wireless sensor network, nodes have limited energy resources, so their life cycle is considered as one of the main concerns about wireless sensor networks. Energy efficiency grouping and routing are two well-known issues in optimization that have been widely studied in order to increase the lifetime of wireless sensor networks. In this paper, an improved particle swarm optimization (IPSO) clustering algorithm for energy efficiency network management is introduced in order to find a route for creating optimal clusters. To evaluate the efficiency of the proposed clustering algorithm, this algorithm is simulated and compared with the particle swarm optimization(PSO) algorithm based on parameters such as network energy, number of live nodes and network life.
Style APA, Harvard, Vancouver, ISO itp.
13

Hari, Parli Baijnath, i Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks". Journal of Advanced Research in Dynamical and Control Systems 11, nr 12 (20.12.2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Thanmayee, Kandula, Geethika S, Dhanush N. Kuchally, Arfa Tazmeen i Dr Pooja Nayak S. "Next Generation Technology: 5G". International Journal of Engineering Research in Computer Science and Engineering 9, nr 10 (13.10.2022): 46–49. http://dx.doi.org/10.36647/ijercse/09.10.art010.

Pełny tekst źródła
Streszczenie:
This paper discusses 5G wireless networks and their upcoming challenges, such as increasing network capacity to support a large number of devices running applications that require high data rates and always-on connectivity; and supporting emerging wireless network business models that necessitate more open networks. New difficulties demand new solutions, such as revised plans for future 5G wireless network location, management, and operation that are equivalent to current wireless networks. One of the main goals of future 5G wireless networks is to integrate cloud reserves and wireless/wired network assets from various infrastructure vendors and/or operators to create service-customized networks for a variety of applications
Style APA, Harvard, Vancouver, ISO itp.
15

Muhammad, Dicky, Gita Indah Hapsari i Giva Andriana Mutiara. "An Experimental Connectivity Performance of Simple Wireless Mesh Implementation Using Wireless Distribution System (WDS)". IJAIT (International Journal of Applied Information Technology) 1, nr 02 (14.08.2017): 18–27. http://dx.doi.org/10.25124/ijait.v1i02.871.

Pełny tekst źródła
Streszczenie:
Today wireless technology grows rapidly, especially in the field of telecommunications and communications. Computer networks now widely utilizes wireless. Wireless Mesh Network is one of the method which is use to communicate computer wirelessly. One important factor in application of wireless network is how to extend wireless signal coverage. Wireless Distribution System is one way to expand the wireless network by mean of wireless interconnection of access point on the network IEEE 8022.11. This study suggests how to build a simple wireless computer network using WDS technology and describes connectivity performance and its signal coverage. The test result of connectivity performance shows that the connectivity between two computers work properly for reliability and multi SSID testing. However, the connectivity was not success in multichannel testing. Furthermore the test result of coverage shows that the range of wireless signal coverage reaches 39 meters with different circumstance room.
Style APA, Harvard, Vancouver, ISO itp.
16

Ramezani, Tayebeh, i Tahereh Ramezani. "A Distributed Method to Reconstruct Connection in Wireless Sensor Networks by Using Genetic Algorithm". Modern Applied Science 10, nr 6 (10.04.2016): 50. http://dx.doi.org/10.5539/mas.v10n6p50.

Pełny tekst źródła
Streszczenie:
In recent years most of the research in the field of sensor networks is allocated to the wireless sensor and actor networks due to their complicacy and vastness of research area. This type of network is a group of sensors and actors wirelessly linked to each other. Sensors gather information of physical world while actors take appropriate decisions on the basis of gathered information and then perform proper actions upon the environment. In wireless sensor and actor networks, it is very important to maintain the connection between actors. Failure of one or more actors can break up the network into separated parts and this failure acts as a barrier to the network to perform its duties. The purpose of the present paper was to provide a genetic algorithm in wireless sensor and actor networks, to improve evaluation and to maintain the connection between actors’ networks. In order to evaluate strong points and weaknesses of the recommended approach, the OMNet++ simulation was used and the outcomes of the simulation were indicative of the recommended approach’s validity.
Style APA, Harvard, Vancouver, ISO itp.
17

Prabhakar, Abhishek, Amod Tiwari i Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, nr 6 (19.04.2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.

Pełny tekst źródła
Streszczenie:
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.
Style APA, Harvard, Vancouver, ISO itp.
18

Chupaev, A. V., R. S. Zaripova, R. R. Galyamov i A. Y. Sharifullina. "The use of industrial wireless networks based on standard ISA-100.11a and protocol WirelessHART in process control". E3S Web of Conferences 124 (2019): 03013. http://dx.doi.org/10.1051/e3sconf/201912403013.

Pełny tekst źródła
Streszczenie:
This article considers wireless technologies in the field of automation of technological processes and production in the energy, chemical, petrochemical and oil refining, gas, railway, mining, metallurgical and other industries where the use of wireless industrial devices is necessary due to specific features. Wireless technologies provide the ability to connect measuring devices directly to the wireless network with further transfer of information through a wireless gateway to an automated control system. This article will discuss the types of wireless networks that are classified according to the possible range of action (Wireless Wide area network, Wireless Local Area Network, Wireless Personal Area Network). The most common standards of organization of wireless industrial networks, including IEEE 802.11 b/g/n, IEEE 802.15.1, IEEE 802.15.4, IEEE 802.16 e, will also be considered, including in the field of management of chemical-technological processes and productions. Data transmission protocols ISA-100.11.a and WirelessHART and a number of their features will be analyzed. The basic standard network structures based on the ISA-100.11.a and WirelessHART protocols, their typical components, will be considered. The article provides an analytical comparison of the ISA100.11a and WirelessHART over the OSI network model layers, including the physical layer, the link layer, the network layer, the transport layer, the session layer, the presentation layer and the application layer (process control, management, security, application sublayer). The main stages of calculation of wireless industrial network are given, in particular: calculation of the network information load, calculation of the network’s energy parameters, frequency-territorial planning, development of the communication scheme and interface with external networks. The formulas for calculating the network information load using Nazarov’s methodology, calculating the network’s energy parameters, taking into account the overall losses in the propagation of radio waves, including losses in free space, losses in partitions and walls inside the building, losses due to interference and signal fading are given.
Style APA, Harvard, Vancouver, ISO itp.
19

Zheng, Jun, Nirwan Ansari, Victor Li, Xuemin Shen, Hossam Hassanein i Baoxian Zhang. "Network coding for wireless communication networks". IEEE Journal on Selected Areas in Communications 27, nr 5 (czerwiec 2009): 577–81. http://dx.doi.org/10.1109/jsac.2009.090601.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Bollapragada, Ramesh, Thomas B. Morawski, Luz E. Pinzon, Steven H. Richman i Raymond Sackett. "Network Planning of Broadband Wireless Networks". Interfaces 37, nr 2 (kwiecień 2007): 143–62. http://dx.doi.org/10.1287/inte.1060.0284.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Luo, Gao Feng, Zi Juan Shi i You Quan Xu. "Simulation and Visualization of Wireless Sensor Networks Based on NS2". Applied Mechanics and Materials 687-691 (listopad 2014): 1766–69. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1766.

Pełny tekst źródła
Streszczenie:
This paper analyzed wireless sensor network simulation technology. We discussed the principles of wireless sensor network simulation based on NS2 and constructed a visual simulation model for wireless sensor networks. By adding NS2 protocol and setting the sensor nodes and some simple parameters, the system presented the running process and the performance of the network in the form of animation and graphics. The results show that this method simplifies the process of simulation of wireless sensor networks, and improves the efficiency of wireless sensor networks research and development, which provides support for the development of application-oriented networking of wireless sensor networks.
Style APA, Harvard, Vancouver, ISO itp.
22

Velmurugan, M. "Fault-Tolerant Routing for Wireless Sensor Networks using a Gaussian Network". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 1031–41. http://dx.doi.org/10.22214/ijraset.2023.53790.

Pełny tekst źródła
Streszczenie:
Abstract: Wireless Sensor Networks (WSNs) are utilised for sensing various physical and environmental variables like temperature, pressure, motion, and pollution. A component of a network to continue operating even when some sensor nodes fail is regarded as fault tolerance in wireless sensor networks. Due to battery life deadlines and the challenges associated with charging or replacing failing nodes, the deployment of sensor nodes in the target area is done in a dense manner to maximise coverage and connection. This paper implements a hybrid fault-tolerant routing methodology to address the problem of fault tolerance in hierarchical topology for wireless sensor networks (WSNs). The network location is partitioned into small square grids, with a Gaussian integer serving as each grid's cluster head. A Gaussian network is created through communicating these cluster heads together. Discovering the Gaussian network's shortest path and multi-path routing, the project implements a hybrid Fault-tolerant Clustering routing protocol based on Gaussian network for Wireless Sensor Network (FCGW). The purpose of FCGW is to improve fault tolerance and reduce energy consumption for Wireless Sensor Networks. Experimental results using MATLAB shows that FCGW protocol has high data reliability. In addition, the FCGW protocol consumes lesser energy in the network compared to other protocols namely FT-LEACH, HEED and PSO-UFC
Style APA, Harvard, Vancouver, ISO itp.
23

Dzhuliy, V. M., A. V. Krasnik, E. S. Lenkov, M. M. Okhramovich i L. O. Ryaba. "STUDY OF PROBLEMS OF CONSTRUCTION OF SAFE SENSOR NETWORKS". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, nr 75 (2022): 51–65. http://dx.doi.org/10.17721/2519-481x/2022/75-06.

Pełny tekst źródła
Streszczenie:
The research of problems of construction of wireless sensor networks is carried out in the work, the main stage of their decision is development of models of the description of a sensor network and the corresponding methods, technologies of maintenance of necessary parameters of quality of functioning of a sensor network. The study involves the consideration of basic technologies and standards in which there is an opportunity to implement the creation of wireless sensor networks. The basis of wireless sensor networks are communication channels organized between network elements using appropriate wireless technology. The main tasks of building wireless sensor networks: determining traffic parameters; determining the list of services; development or selection of a network model; determination of network functioning indicators; solving the problem of compromise between the quality of operation, traffic and resources. A number of wireless networking technologies are widespread in corporate networks, use an unlicensed frequency band, and in private networks, which allows their use in a number of tasks, due to the density of devices that support them and the availability of technology. A number of technologies do not support the functions of self-organization of the communication network. Such mechanisms can be implemented using software and related protocols at the network level. Existing technologies have the ability to organize communication from tens to tens of thousands of meters. For specific applications, it is one of the essential factors in choosing the appropriate technology. The probability of connectivity in wireless sensor networks depends on the structure and parameters that determine the network: characteristics of the service area (volume, flat, configuration, geometric dimensions), number of network nodes, characteristics of communication capabilities of network elements, antenna patterns, standards and protocols, communication range, transmitter power), features of the involved routing protocols. Features of providing connectivity in wireless sensor networks lie in the possibility of using gateways built using various technologies, which can significantly expand the capabilities of wireless networks in increasing the likelihood of connectivity. A feature of the construction of wireless sensor networks are significant differences in traffic servicing in the networks of different technologies used. Indicators of the quality of wireless networks, such as bandwidth, delay, probability of loss are interdependent and show how effectively the sensor network works. When you change one of the performance indicators of wireless sensor networks, it affects other quality indicators.
Style APA, Harvard, Vancouver, ISO itp.
24

Li Na, Zhang Ying i Cheng Jihong. "A wireless bus circle Network Structure for Wireless Sensor Networks". Journal of Convergence Information Technology 8, nr 10 (31.05.2013): 1218–27. http://dx.doi.org/10.4156/jcit.vol8.issue10.147.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Prema K N, Ushadevi M B, Smitha S M i Roopa B S. "End to end delay distribution analysis and interference aware high throughput for Wireless Mesh Networks". World Journal of Advanced Engineering Technology and Sciences 10, nr 1 (30.09.2023): 122–29. http://dx.doi.org/10.30574/wjaets.2023.10.1.0255.

Pełny tekst źródła
Streszczenie:
The wireless mesh network is an innovative and efficient wireless communication approach with immense potential to transform future wireless networks. This cutting-edge wireless technology provides a wide range of wireless services for personal, local, campus, and metropolitan environments. The wireless mesh network consists of a cluster of mobile wireless nodes that can dynamically and instantaneously create random and temporary network topologies, forming a wireless ad-hoc network. Ad hoc wireless networks are particularly advantageous due to their cost-effectiveness and ease of deployment. In order to further optimize the performance of ad-hoc networks, different routing algorithms such as Ad-hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing Algorithm (DSR) and Destination Sequenced Distance Vector (DSDV) have been thoroughly researched via simulation.
Style APA, Harvard, Vancouver, ISO itp.
26

Swetha Priya, T. C., i R. Sridevi. "Novel Clustering Techniques in Wireless Sensor Networks – A Survey". International journal of electrical and computer engineering systems 14, nr 7 (11.09.2023): 733–42. http://dx.doi.org/10.32985/ijeces.14.7.1.

Pełny tekst źródła
Streszczenie:
A study of Wireless Sensor Networks has been growing tremendously these days. Wireless Sensor Networks play a major role in various fields ranging from smart homes to health care. WSN’s operate independently in remote places. Because of tiny size of the nodes in such type of networks, they have a limited number of resources in terms of energy and power. Basically, sensor networks can be classified into flat and cluster based Wireless Sensor Networks. But, Clustering based Sensor Networks play a major role in reducing the energy consumption in Wireless Sensor Networks. Clustering also focuses on solving the No.s that arise during transmission of data. Clustering will group nodes into clusters and elects Cluster Heads for all clusters in the network. Then the nodes sense data and send that data to cluster head where the aggregation of data will take place. This paper focuses on various novel clustering techniques that improve the network’s lifetime.
Style APA, Harvard, Vancouver, ISO itp.
27

Chen, De Feng, Wen Yan Zhang i Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise". Applied Mechanics and Materials 602-605 (sierpień 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.

Pełny tekst źródła
Streszczenie:
Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.
Style APA, Harvard, Vancouver, ISO itp.
28

Oksiiuk, Oleksandr, i Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK". Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, nr 1 (3.03.2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.

Pełny tekst źródła
Streszczenie:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. Mobility and dynamic topology are the main characteristics of ad hoc networks. In the last years, the hundreds of new routing protocols were designed, that are used for the various scenarios of this design space. The routing features in wireless ad hoc networks are described. The corresponding routing protocols are reviewed. The paper proposes a method for selecting the preferred protocol wireless networks using the mathematical tools of neural networks.
Style APA, Harvard, Vancouver, ISO itp.
29

Zach, Petr, Martin Pokorný i Jiří Balej. "Voice Quality Estimation in Wireless Networks". Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 63, nr 6 (2015): 2179–85. http://dx.doi.org/10.11118/actaun201563062179.

Pełny tekst źródła
Streszczenie:
This article deals with the impact of Wireless (Wi-Fi) networks on the perceived quality of voice services. The Quality of Service (QoS) metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE) provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP) calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.
Style APA, Harvard, Vancouver, ISO itp.
30

Kim, Won-Suk, i Sang-Hwa Chung. "Proxy SDN Controller for Wireless Networks". Mobile Information Systems 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/7172187.

Pełny tekst źródła
Streszczenie:
Management of wireless networks as well as wired networks by using software-defined networking (SDN) has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC) for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.
Style APA, Harvard, Vancouver, ISO itp.
31

Malik, Haseeb, Humaira Afzal, M. Rafiq Mufti, Asghar Ali i Ali Hassan. "Challenges and Research Advancement in 5G Wireless Backhaul Networks". STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, nr 2 (30.12.2021): 117–29. http://dx.doi.org/10.52700/scir.v3i2.35.

Pełny tekst źródła
Streszczenie:
5G networks should achieve Gigabit speed in the future cellular network. Getting higher speed is a considerable challenge to manage the 5G Wireless Backhaul Network functionally. This research studies two network wireless backhaul architectures such as small cell networks and millimeter-wave transmission technologies for Centralized and Distributed scenarios. In addition, for various network topologies and wireless backhaul network frequency bands, energy efficiency is compared. Numeric comparative findings give guidance for deploying inexpensive and high energy capability of future 5G wireless backhaul networks
Style APA, Harvard, Vancouver, ISO itp.
32

Malik, Haseeb, Humaira Afzal, M. Rafiq Mufti, Asghar Ali i Ali Hassan. "Challenges and Research Advancement in 5G Wireless Backhaul Networks". STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, nr 2 (30.12.2021): 117–29. http://dx.doi.org/10.52700/scir.v3i2.35.

Pełny tekst źródła
Streszczenie:
5G networks should achieve Gigabit speed in the future cellular network. Getting higher speed is a considerable challenge to manage the 5G Wireless Backhaul Network functionally. This research studies two network wireless backhaul architectures such as small cell networks and millimeter-wave transmission technologies for Centralized and Distributed scenarios. In addition, for various network topologies and wireless backhaul network frequency bands, energy efficiency is compared. Numeric comparative findings give guidance for deploying inexpensive and high energy capability of future 5G wireless backhaul networks
Style APA, Harvard, Vancouver, ISO itp.
33

P., Renuka Devi. "Underwater Communication Using Wireless Sensor Networks". International Journal of Psychosocial Rehabilitation 24, nr 5 (20.04.2020): 2264–75. http://dx.doi.org/10.37200/ijpr/v24i5/pr201925.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Shokrzadeh, Hamid, M. R. Majma, A. Movassagh i M. Saheb. "Routing Security in Wireless Sensor Networks". Lecture Notes on Software Engineering 3, nr 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

N, Jeeva. "Wireless Networks in Day Today Life". International Journal of Research Publication and Reviews 4, nr 4 (8.04.2023): 1903–6. http://dx.doi.org/10.55248/gengpi.2023.4.4.35848.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Chen, Bowen. "Wireless Communication Chip Designs: analysis of the Wireless Integrated Network Sensors". Highlights in Science, Engineering and Technology 70 (15.11.2023): 580–87. http://dx.doi.org/10.54097/hset.v70i.13989.

Pełny tekst źródła
Streszczenie:
With the development of wireless technology, wireless integrated network sensor is a new form of sensor network. It enables highly efficient data acquisition and transmission by connecting the sensor nodes wirelessly. The purpose of this study is to investigate the basic principles and techniques of wireless integrated network sensors, analyze their application fields, and conduct experimental studies to verify their performance. This study first introduces the basic principles of wireless integrated network sensors, including wireless communication, sensor nodes, and network topology. Then, related technologies, including energy management, routing protocols and network security, are studied to improve the performance and stability of wireless integrated network sensors. Wireless integrated network sensors have wide application prospects in environmental monitoring, intelligent transportation and agriculture. Meanwhile, the energy utilization efficiency and network stability of the sensor network can be improved by adopting the new energy management mechanism and routing protocol. This study reveals the potential and value in practical applications through the exploration and research of wireless integrated network sensors. In future studies, the energy management and routing mechanisms of sensor networks can be further optimized to improve their performance and reliability. In addition, more application scenarios suitable for wireless integrated network sensors can be explored to provide solutions for practical problems.
Style APA, Harvard, Vancouver, ISO itp.
37

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES". International Journal of Innovative Research in Advanced Engineering 9, nr 5 (31.05.2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Pełny tekst źródła
Streszczenie:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Style APA, Harvard, Vancouver, ISO itp.
38

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES". International Journal of Innovative Research in Advanced Engineering 9, nr 5 (31.05.2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Pełny tekst źródła
Streszczenie:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Style APA, Harvard, Vancouver, ISO itp.
39

Rusdan, Muchamad, i Muhamad Sabar. "Design and Analysis of Wireless Network with Wireless Distribution System using Multi-Factor Authentication-based User Authentication". Journal of Information Technology 2, nr 1 (2.03.2020): 17–24. http://dx.doi.org/10.47292/joint.v2i1.004.

Pełny tekst źródła
Streszczenie:
Wireless networks are one of the best alternatives in building practical and flexible computer networks that have high mobility. Most of them use wireless networks to support existing cable networks, but on wireless networks, they still use cable media as a backbone of the access point, which supports communication users can access the internet and find information. The problem of using cables as backbone media can be a significant challenge in places that are difficult to reach by wires. Wireless networks provide convenience and convenience that is high enough to use. As long as they are in an area that is supported by a wireless network, users can access the internet at any time. To make the wireless network connected to the internet safe and easy to use, we can create a user authentication system based on Multi-Factor Authentication (MFA) that can be used to authenticate and authorize. In general, each user can use existing wireless network services by verifying users based on Wifi Protected Access 2 Pre-Shared Key (WPA2-PSK). The purpose of this research is to develop a wireless network that uses Multi-Factor Authentication (MFA) based user authentication to be able to connect to the wireless network to increase security and provide the use of existing wireless networks. The research method used in this study uses descriptive qualitative research methods, with data collection using literature study and observation techniques. After analysis and design, it can be concluded that user authentication is based on Multi-factor Authentication (MFA) in a safe and user-friendly manner that can determine the users who are allowed and not allowed to use wireless networks.
Style APA, Harvard, Vancouver, ISO itp.
40

Lv, Xiaojing, i Dongphil Chun. "Media Information Dissemination Model of Wireless Networks Using Deep Residual Network". Mobile Information Systems 2021 (2.07.2021): 1–10. http://dx.doi.org/10.1155/2021/1711944.

Pełny tekst źródła
Streszczenie:
Information dissemination and its prediction in wireless networks is a challenging task. Researchers have studied the prediction process of media information dissemination in wireless networks using various methods. In this paper, we analyze information dissemination in wireless networks using a deep residual network model. In the proposed model, the relative weight of nodes and the dissemination probability of media information in wireless networks are obtained. The obtained information is the inputs into the deep residual network as features. The convolution feature extractor is used to obtain the details of the input features. Finally, the propagation information is classified according to the extracted features through the full connection layer. We have used the SELU activation function to optimize the deep residual network. In this way, a complete media information dissemination prediction of wireless networks is obtained. The simulation results show that the proposed model has fast convergence and a low bit error rate of information dissemination. It reflects the characteristics of media information dissemination in a wireless network in real-time applications. The results show accurate prediction of media information dissemination in wireless networks.
Style APA, Harvard, Vancouver, ISO itp.
41

Assegie, Tsehay Admassu, i Pramod Sekharan Nair. "The performance of Gauss Markov’s mobility model in emulated software defined wireless mesh network". Indonesian Journal of Electrical Engineering and Computer Science 18, nr 1 (1.04.2020): 428. http://dx.doi.org/10.11591/ijeecs.v18.i1.pp428-433.

Pełny tekst źródła
Streszczenie:
Wireless mesh networks (WMNs) are a new trend in wireless communication promising greater flexibility, reliability, and performance over traditional wireless local area networks (WLANs).Test bed analysis and emulation plays an important role in evaluation of wireless networks and node mobility is the prominent feature of next generation wireless network. In this paper we will focus on the models of wireless station mobility and discuss their importance within the software defined wireless mesh network performance evaluation. The existing mobility models for the next generation software defined wireless network will be explored. Finlay, we will present the mobility models in the mininet-Wi-Fi test bed, and evaluate the performance of the models
Style APA, Harvard, Vancouver, ISO itp.
42

Xiao, Wen Hong, i Xiang Dong Cai. "A Novel Wireless Sensor Network Model Based on Complex Network Theory". Advanced Materials Research 546-547 (lipiec 2012): 1276–82. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1276.

Pełny tekst źródła
Streszczenie:
The key issue of wireless sensor networks is to balance the energy costs of the entire network, to enhance the robustness of the entire sensor network. Sensor networks as a special kind of complex network, in particular, environmental constraints, and more from the traditional complex networks, such as Internet networks, ecological networks, social networks, is to introduce a way of wireless sensor networks way of complex networks theory and analytical method, the key lies in, which is a successful model of complex network theory and analysis methods, more suitable for the application of wireless sensor networks, in order to achieve certain characteristics of some wireless sensor networks to optimize the network. Considering multi-hop transmission of sensor network, this paper has proposed a maximum restriction on the communication radius of each sensor node; in order to improve the efficiency of energy consumption and maintain the sparsely of the entire network, this paper has also added a minimum restriction on the communication radius of each sensor node to the improved model; to balance the energy consumption of the entire network, The simulation results show that proposed improvements to the entire network more robust to random failure and energy costs are more balanced and reasonable. This is more applicable to wireless sensor networks.
Style APA, Harvard, Vancouver, ISO itp.
43

Barreto, Luís. "XCP-Winf and RCP-Winf: Improving Explicit Wireless Congestion Control". Journal of Computer Networks and Communications 2015 (2015): 1–18. http://dx.doi.org/10.1155/2015/925207.

Pełny tekst źródła
Streszczenie:
Congestion control in wireless networks is strongly dependent on the dynamics and instability of wireless links. Therefore, it is very difficult to accurately evaluate the characteristics of the wireless links. It is known that TCP experiences serious performance degradation problems in wireless networks. Moreover, congestion control mechanisms that rely on network interaction and network parameters, such as XCP and RCP, do not evaluate accurately the capacity and available link bandwidth in wireless networks. In this paper we propose new explicit flow control protocols for wireless mesh networks, based on XCP and RCP. We name these protocols XCP-Winf and RCP-Winf. They rely on the MAC layer information gathered by a new method to accurately estimate the available bandwidth and the path capacity over a wireless network path. The estimation is performed in real time and without the need to intrusively inject packets in the network. These new congestion control mechanisms are evaluated in different scenarios in wireless mesh and ad hoc networks and compared against several new approaches for wireless congestion control. It is shown that both XCP-Winf and RCP-Winf outperform the evaluated approaches, showing its stable behavior and better channel utilization.
Style APA, Harvard, Vancouver, ISO itp.
44

Salami, Oladayo, Antoine Bagula i H. Chan. "Route Availability Model for Inter-working Multi-hop Wireless Networks". International Journal of Electronics and Telecommunications 56, nr 2 (1.06.2010): 185–90. http://dx.doi.org/10.2478/v10177-010-0024-1.

Pełny tekst źródła
Streszczenie:
Route Availability Model for Inter-working Multi-hop Wireless NetworksIn order to link a source-destination node pair in inter-working multi-hop wireless networks, links or routes must first be available. It is only after establishing the availability of links and routes between nodes that factors which affect connectivity e.g. interference can be considered. Connectivity in multi-hop wireless networks has been studied. However, the studies focused on network connectivity in ad-hoc networks. Since the next generation of wireless networks will be inter-working, an understanding of connectivity as it applies to such networks is needed. Specifically, this paper emphasizes that an analysis of route connectivity rather than network connectivity is needed for inter-working multi-hop wireless networks. With a focus on route connectivity, a route availability model for inter-working multi-hop wireless networks is presented.
Style APA, Harvard, Vancouver, ISO itp.
45

Zhao, Ying, Ru Kun Li i Kun Le Xu. "The Design of Wireless Sensor Networks and Data Analysis in Smart Grids". Advanced Materials Research 978 (czerwiec 2014): 257–60. http://dx.doi.org/10.4028/www.scientific.net/amr.978.257.

Pełny tekst źródła
Streszczenie:
Smart grids have a close relationship to advanced sensing technology and communication technology and also have provided a new application platform for wireless sensor networks. From wireless sensor networks research development and characteristics, combined with current status of wireless sensor networks applications in power system, this paper describes its key technologies of wireless sensor networks, then analyze applications and data analysis of the wireless sensor network in the smart grids.
Style APA, Harvard, Vancouver, ISO itp.
46

V, Sujatha, i E. A. Mary Anitha. "Immensely Discriminate Routing in Wireless Networks". Indonesian Journal of Electrical Engineering and Computer Science 8, nr 3 (1.12.2017): 712. http://dx.doi.org/10.11591/ijeecs.v8.i3.pp712-714.

Pełny tekst źródła
Streszczenie:
Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.
Style APA, Harvard, Vancouver, ISO itp.
47

Singh, Barinder Paul, Anish Arora i Ashish Kumar. "Security in Wireless Sensor Networks". JOURNAL OF ADVANCES IN PHYSICS 1, nr 1 (25.10.2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.

Pełny tekst źródła
Streszczenie:
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
Style APA, Harvard, Vancouver, ISO itp.
48

Wang, Hao, i Jin Tao Shi. "Safety Protection Technology in the Application of the Wireless Network". Applied Mechanics and Materials 685 (październik 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.685.591.

Pełny tekst źródła
Streszczenie:
As wireless networks edge closer towards wide-spread deployment, security issues become a central concern.This article analyses the wireless network security and the demand from wireless access control, wireless routing technology, and testing to protect the fields under the wireless network and safety of research progress. We point out its development direction based on the analysis and remark of problems remaining unsolved in wireless networks.
Style APA, Harvard, Vancouver, ISO itp.
49

Ma, Jin Jin, Guang Jin, Xian Liang Jiang, Lu Juan Huang i Xian Mang He. "On the Wireless Network Curriculum Teaching". Applied Mechanics and Materials 378 (sierpień 2013): 514–19. http://dx.doi.org/10.4028/www.scientific.net/amm.378.514.

Pełny tekst źródła
Streszczenie:
Wireless network technology has developed rapidly and been widely used in different forms, such as Wireless LAN (WLAN), Wireless Sensor Network (WSN) and the 3G Mobile Communications. As one core curriculum of IT major, the computer network curriculum mainly focuses on the wired networks rather than the wireless networks and is hard to meet the needs of IT industry. In this paper, we firstly survey the current teaching of wireless network techniques and then discuss the necessity of the wireless network curriculums. By improving teaching contents and methods, we put forward a novel wireless network teaching mode using simulation tools.
Style APA, Harvard, Vancouver, ISO itp.
50

Fan, Bin, Bin Tang, Zhihao Qu i Baoliu Ye. "Network Coding Approaches for Distributed Computation over Lossy Wireless Networks". Entropy 25, nr 3 (27.02.2023): 428. http://dx.doi.org/10.3390/e25030428.

Pełny tekst źródła
Streszczenie:
In wireless distributed computing systems, worker nodes connect to a master node wirelessly and perform large-scale computational tasks that are parallelized across them. However, the common phenomenon of straggling (i.e., worker nodes often experience unpredictable slowdown during computation and communication) and packet losses due to severe channel fading can significantly increase the latency of computational tasks. In this paper, we consider a heterogeneous, wireless, distributed computing system performing large-scale matrix multiplications which form the core of many machine learning applications. To address the aforementioned challenges, we first propose a random linear network coding (RLNC) approach that leverages the linearity of matrix multiplication, which has many salient properties, including ratelessness, maximum straggler tolerance and near-ideal load balancing. We then theoretically demonstrate that its latency converges to the optimum in probability when the matrix size grows to infinity. To combat the high encoding and decoding overheads of the RLNC approach, we further propose a practical variation based on batched sparse (BATS) code. The effectiveness of our proposed approaches is demonstrated by numerical simulations.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii