Results for 'Wireless Networks'

1000+ found
Order:
  1. Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay.Ling Yang, Weiwei Yang, Liang Tang, Liwei Tao, Xingbo Lu & Zhengyun He - 2022 - Complexity 2022:1-24.
    In this work, we investigated a covert communication method in wireless networks, which is realized by multiantenna full-duplex single relay. In the first stage, the source node sends covert messages to the relay, and the relay uses a single antenna to send interference signals to the adversary node to protect the covert information being transmitted. In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  24
    Impulsive controller for wireless networked control system: Switched system approach.Yuan-Qing Wu, Hongye Su & Kalidass Mathiyalagan - 2016 - Complexity 21 (5):291-299.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  4
    Ghost Walks for Wireless Networks.Robert Seddon - 2021 - In Michael Nagenborg, Taylor Stone, Margoth González Woge & Pieter E. Vermaas (eds.), Technology and the City: Towards a Philosophy of Urban Technologies. Springer Verlag. pp. 429-450.
    Cities as we know them are built on layers of their own pasts. Moreover, cities remember themselves by preserving historic buildings, erecting statues, writing history into the names of streets, and otherwise conserving and commemorating local heritage. With widespread computerisation and computer networks come new and diverse layers of the city: digital geographies that overlie physical urban sprawl. The city of tomorrow will blend data deeply into its culture and administration; the day after tomorrow, such data will have joined (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  19
    NonfragileH∞filtering for wireless-networked systems with energy constraint.Rongyao Ling & Dan Zhang - 2016 - Complexity 21 (S1):79-89.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  24
    The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance.Stephen F. Bush & Nathan Smith - forthcoming - Arxiv Preprint Cs/0512092:27--30.
    A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. K-Tme: A multiple tree vidde multicast protocol for Ad Hoe wireless networks.B. Animdh, T. B. Reddy & C. S. R. Murthy - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark  
  7. Workshop on Modelling of Location Management in Mobile Information Systems (MLM 06)-Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks.Seung-Jae Yoo & Kuinam J. Kim - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3981--1025.
     
    Export citation  
     
    Bookmark  
  8.  17
    Finite-Time Nonfragile Dissipative Filter Design for Wireless Networked Systems with Sensor Failures.R. Sakthivel, V. Nithya, Yong-Ki Ma & Chao Wang - 2018 - Complexity 2018:1-13.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  28
    Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.D. Ventura, Aitor Gómez-Goiri, V. Catania, Diego López-de-Ipiña, J. A. M. Naranjo & L. G. Casado - 2016 - Logic Journal of the IGPL 24 (4).
  10.  15
    Wireless ad hoc nanoscale networking.Stephen F. Bush - 2009 - Ieee Wireless Communications 16 (5):6--7.
    Wireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  58
    A Control and Management Network for Wireless ATM Systems.Stephen Bush, Jagannath F., Evans Sunil, B. Joseph, Victor Frost, Gary Minden & K. Sam Shanmugan - 1997 - Acm-Baltzer Wireless Networks 3:267--283.
    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Wireless Sensor Networks-An Approach for the Reduction of Power Consumption in Sensor Nodes of Wireless Sensor Networks: Case Analysis of Mica2.Adriano B. Da Cunha & Diogenes C. Da Silva Jr - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 132-141.
    No categories
     
    Export citation  
     
    Bookmark  
  13.  16
    Channel Contention-Based Routing Protocol for Wireless Ad Hoc Networks.Noor Mast, Muhammad Altaf Khan, M. Irfan Uddin, Syed Atif Ali Shah, Atif Khan, Mahmoud Ahmad Al-Khasawneh & Marwan Mahmoud - 2021 - Complexity 2021:1-10.
    With the development of wireless technology, two basic wireless network models that are commonly used, known as infrastructure and wireless ad hoc networks, have been developed. In the literature, it has been observed that channel contention is one of the main reasons for packet drop in WANETs. To handle this problem, this paper presents a routing protocol named CCBR. CCBR tries to determine a least contended path between the endpoints to increase packet delivery ratio and to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  31
    Increasing Energy Efficiency in Wireless Sensor Networks Using GA-ANFIS to Choose a Cluster Head and Assess Routing and Weighted Trusts to Demodulate Attacker Nodes.Shaymaa Al Hayali, Javad Rahebi, Osman N. Ucan & Oguz Bayat - 2020 - Foundations of Science 25 (4):1227-1246.
    Demodulating harmful nodes and diminishing the energy waste in sensor nodes can prolong the lifespan of wireless sensor networks. In this study, a genetic algorithm and an adaptive neuro fuzzy inference system were used to diminish the energy waste of sensors. Weighted trust evaluation was applied to search for harmful nodes in the network to prolong the lifespan of WSNs. A low-energy adaptive clustering hierarchy method was used to analyze the results. It was discovered that searching for harmful (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  13
    Research on Wireless Sensor Network Coverage Path Optimization Based on Biogeography-Based Optimization Algorithm.Guojun Chen, Xiangdong Qin, Ningsheng Fang & Wenbo Xu - 2021 - Complexity 2021:1-8.
    Path selection is one of the key technologies of wireless sensor network. A reasonable choice of coverage path can improve the service quality of WSN and extend the life cycle of WSN. Biogeography-based optimization is widely used in the field of cluster intelligent optimization because its search method has a better incentive mechanism for population evolution. In this paper, the move-in and move-out operation and mutation operation of the BBO algorithm enable WSN to find an efficient routing path. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors (...)
     
    Export citation  
     
    Bookmark  
  17.  7
    Black widow optimization for reducing the target uncertainties in localization wireless sensor networks.Rubén Ferrero-Guillén, José-Manuel Alija-Pérez, Alberto Martínez-Gutiérrez, Rubén Álvarez, Paula Verde & Javier Díez-González - forthcoming - Logic Journal of the IGPL.
    Localization Wireless Sensor Networks (WSN) represent a research topic with increasing interest due to their numerous applications. However, the viability of these systems is compromised by the attained localization uncertainties once implemented, since the network performance is highly dependent on the sensors location. The Node Location Problem (NLP) aims to obtain the optimal distribution of sensors for a particular environment, a problem already categorized as NP-Hard. Furthermore, localization WSN usually perform a sensor selection for determining which nodes are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  43
    Theft in a wireless world.Luc Small - 2007 - Ethics and Information Technology 9 (3):179-186.
    I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  10
    Consumption Reduction Solution of TV News Broadcast System Based on Wireless Communication Network.Haifeng Qiang - 2021 - Complexity 2021:1-13.
    At present, the news broadcast system using mobile network on the market provides the basic functions required by TV stations, but there are still many problems and shortcomings. In view of the main problems existing in the current system and combined with the actual needs of current users, this paper has preliminarily developed a news broadcast system based on 5G Live. The card frame adaptive strategy significantly improves the user experience by using gradual video frame buffering technology. Hardware codec technology (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Adrian Mackenzie, Wirelessness: Radical Empiricism in Network Culture.Jon Goodbun - 2011 - Radical Philosophy 170:59.
     
    Export citation  
     
    Bookmark  
  21. Power Efficient Wireless Video Communications Over CDMA Networks.Xiaoan Lu, Yao Wang, Elza Erkip & David Goodman - 2006 - Complexity 500:s1.
    No categories
     
    Export citation  
     
    Bookmark  
  22.  17
    Analysis on Invulnerability of Wireless Sensor Network towards Cascading Failures Based on Coupled Map Lattice.Xiuwen Fu, Yongsheng Yang & Haiqing Yao - 2018 - Complexity 2018:1-14.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  24. Introduction to Wireless Sensor Networks.Marco Valero - 2005 - Telos: Critical Theory of the Contemporary 4:04.
     
    Export citation  
     
    Bookmark  
  25.  19
    Predictive Trajectory-Based Mobile Data Gathering Scheme for Wireless Sensor Networks.Fan Chao, Zhiqin He, Renkuan Feng, Xiao Wang, Xiangping Chen, Changqi Li & Ying Yang - 2021 - Complexity 2021:1-17.
    Tradition wireless sensor networks transmit data by single or multiple hops. However, some sensor nodes close to a static base station forward data more frequently than others, which results in the problem of energy holes and makes networks fragile. One promising solution is to use a mobile node as a mobile sink, which is especially useful in energy-constrained networks. In these applications, the tour planning of MS is a key to guarantee the network performance. In this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  7
    A Dynamic Variance-Based Triggering Scheme for Distributed Cooperative State Estimation over Wireless Sensor Networks.Hongbo Zhu & Jiabao Ding - 2021 - Complexity 2021:1-12.
    Wireless sensor networks have been spawning many new applications where cooperative state estimation is essential. In this paper, the problem of performing cooperative state estimation for a discrete linear stochastic dynamical system over wireless sensor networks with a limitation on the sampling and communication rate is considered, where distributed sensors cooperatively sense a linear dynamical process and transmit observations each other via a common wireless channel. Firstly, a novel dynamic variance-based triggering scheme is designed to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. International Workshop on Sensor Networks (IWSN 2006)-Robust Multipath Routing to Exploit Maximally Disjoint Paths for Wireless Ad Hoe Networks.Jungtae Kim, Sangman Moh, Ilyong Chung & Chansu Yu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 306-309.
    No categories
     
    Export citation  
     
    Bookmark  
  28.  40
    Denial jamming attacks on wireless sensor network using sensitive agents.Camelia-M. Pintea, Petrică C. Pop & Ioana Zelina - 2016 - Logic Journal of the IGPL 24 (1).
  29.  75
    Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.Josué Toledo-Castro, Pino Caballero-Gil, Nayra Rodríguez-Pérez, Iván Santos-González, Candelaria Hernández-Goya & Ricardo Aguasca-Colomo - 2018 - Complexity 2018:1-17.
    Huge losses and serious threats to ecosystems are common consequences of forest fires. This work describes a forest fire controller based on fuzzy logic and decision-making methods aiming at enhancing forest fire prevention, detection, and fighting systems. In the proposal, the environmental monitoring of several dynamic risk factors is performed with wireless sensor networks and analysed with the proposed fuzzy-based controller. With respect to this, meteorological variables, polluting gases and the oxygen level are measured in real time to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  6
    A Novel Dynamic Routing Approach to Distributed Wireless Sensor Network in Aircraft Environment.Hui Sun, Chengrui Bai, Yahui Li & Kaixin Yang - 2021 - Complexity 2021:1-8.
    The trend to implement the monitoring system with a wireless sensor network has been becoming urgent due to guaranteed flight safety and the passengers comfortability in travel. In this paper, a new dynamic routing algorithm is proposed to prolong the lifetime of the monitoring system with a distributed network based on the K-coverage method, and filter algorithm to be used for data fusion. Finally, the simulation results validate the effectiveness of the proposed approach.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  38
    Environmental monitoring using a robotized wireless sensor network.Sevil A. Ahmed, Vasil L. Popov, Andon V. Topalov & Nikola G. Shakev - 2018 - AI and Society 33 (2):207-214.
    Big cities and growing industrial areas bring high risk of different kinds of pollutions which would implicate to the quality of life of the society. Discovering and monitoring of polluted areas using autonomous mobile robots is nowadays a frequently considered solution concerning both environmental and human safety problems. Being part of a distributed control system, such robots can help to improve the efficiency of the existing conventional pollution prevention systems. On the other hand, during the last decade, wireless sensor (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  18
    Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks.Yusor Rafid Bahar Al-Mayouf, Ahmed Basil Ghazi & Omar Adil Mahdi - 2021 - Journal of Intelligent Systems 30 (1):564-577.
    Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  4
    A Moving Object Detection Method Using Deep Learning-Based Wireless Sensor Networks.Linghua Zhao & Zhihua Huang - 2021 - Complexity 2021:1-12.
    Aiming at the problem of real-time detection and location of moving objects, the deep learning algorithm is used to detect moving objects in complex situations. In this paper, based on the deep learning algorithm of wireless sensor networks, a novel target motion detection method is proposed. This method uses the deep learning model to extract visual potential representation features through offline similarity function ranking learning and online model incremental update and uses the hierarchical clustering algorithm to achieve target (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  15
    Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing.Jie Liu & Li Zhu - 2021 - Complexity 2021:1-11.
    Resource allocation has always been a key technology in wireless sensor networks, but most of the traditional resource allocation algorithms are based on single interface networks. The emergence and development of multi-interface and multichannel networks solve many bottleneck problems of single interface and single channel networks, it also brings new opportunities to the development of wireless sensor networks, but the multi-interface and multichannel technology not only improves the performance of wireless sensor (...) but also brings great challenges to the resource allocation of wireless sensor networks. Edge computing changes the traditional centralized cloud computing processing method into a method that reduces computing storage capacity to the edge of the network and faces users and terminals. Realize the advantages of lower latency, higher bandwidth, and fast response. Therefore, this paper proposes a joint optimization algorithm of resource allocation based on edge computing. We establish a wireless sensor allocation model and then propose our algorithm model combined with the advantages of edge computing. Compared with the traditional allocation algorithm, it can further improve the resource utilization, reduce the network energy consumption, increase network capacity, and reduce the complexity of the schemes. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  15
    Investigation of Speed Matching Affecting Contrarotating Fan’s Performance Using Wireless Sensor Network including Big Data and Numerical Simulation.Hengxuan Luan, Liyuan Weng, Ranhui Liu, Yuanzhong Luan & Dongmin Li - 2018 - Complexity 2018:1-12.
    This paper describes the investigations performed to better understand two-stage rotor speed matching in a contrarotating fan. In addition, this study develops a comprehensive measuring and communication system for a contrarotating fan using ZigBee network. The investigation method is based on three-dimensional RANS simulations; the RANS equations are solved by the numerical method in conjunction with a SST turbulence model. A wireless measurement system using big data method is first designed, and then a comparison is done with experimental measurements (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  3
    From Innovation Community to Community Innovation: User-initiated Innovation in Wireless Leiden.Nelly Oudshoorn, Stefan Verhaegh & Ellen van Oost - 2009 - Science, Technology, and Human Values 34 (2):182-205.
    The role of users in innovation processes has gained increasing attention in innovation studies, technology studies, and media studies. Scholars have identified users and use practices as a source of innovation. So far, however, little insight has been generated in innovation processes in which communities of users are the driving force in all phases of the innovation process. This article explores the conceptual vocabularies of innovation studies and actor— network theory and discusses their adequacy for describing and understanding the dynamics (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  3
    Free Space Optics in the Czech Wireless Community: Shedding Some Light on the Role of Normativity for User-Initiated Innovations.Johan Söderberg - 2011 - Science, Technology, and Human Values 36 (4):423-450.
    The article investigates how users in the Czech wireless network community invented a technology for sending data over visible, red light. For five years, this was the most affordable method for connecting computers. The development of this technology was guided by the idea that it should be controlled by its users. With reference to this experiment, it is argued that a shared ethical and/or political vision can contribute to the establishment of norms within user communities encouraging their members to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Simple Fusion with Low Complexity for Distributed Multitarget Classification in Wireless Sensor Networks.Kwanglak Jung, Jintae Park & Kiseon Kim - 2007 - Complexity 6:7.
    No categories
     
    Export citation  
     
    Bookmark  
  39.  15
    Randomized and Efficient Time Synchronization in Dynamic Wireless Sensor Networks: A Gossip-Consensus-Based Approach.Nan Xiong, Minrui Fei, Taicheng Yang & Yu-Chu Tian - 2018 - Complexity 2018:1-16.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  39
    Reconstructivism versus Critical Theory of Technology: Alternative Perspectives on Activism and Institutional Entrepreneurship in the Czech Wireless Community.Johan Söderberg - 2010 - Social Epistemology 24 (4):239-262.
    This article sets out to compare reconstructivism and critical theory as two possible avenues for a normative science and technology studies discipline “after constructivism”. This investigation is pursued through a case study of a wireless network community in the Czech Republic. The case study focuses on a schism that erupted after some users attempted to commercialise an invention for sending data with visible light. Their enterprise was partly motivated by a larger, political aspiration of creating a decentralised communication infrastructure. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  26
    Reconstructivism versus critical theory of technology: Alternative perspectives on activism and entrepreneurship in the Czech wireless community.J. Söderberg - 2008 - In Duncan Pritchard, Alan Millar & Adrian Haddock (eds.), Social Epistemology. Oxford, GB: Oxford University Press. pp. 24--4.
    This article sets out to compare reconstructivism and critical theory as two possible avenues for a normative science and technology studies discipline “after constructivism”. This investigation is pursued through a case study of a wireless network community in the Czech Republic. The case study focuses on a schism that erupted after some users attempted to commercialise an invention for sending data with visible light. Their enterprise was partly motivated by a larger, political aspiration of creating a decentralised communication infrastructure. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  28
    The Performance Study on the Long-Span Bridge Involving the Wireless Sensor Network Technology in a Big Data Environment.Liwen Zhang, Chao Zhang, Zhuo Sun, You Dong & Pu Wei - 2018 - Complexity 2018:1-13.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  9
    Performance Analysis of Wireless Location and Velocity Tracking of Digital Broadcast Signals Based on Extended Kalman Filter Algorithm.Yukai Hao & Xin Qiu - 2021 - Complexity 2021:1-10.
    In order to improve the accuracy and reliability of wireless location in NLOS environment, a wireless location algorithm based on artificial neural network is proposed for NLOS positioning error caused by non-line-of-sight propagation, such as occlusion and signal reflection. The mapping relationship between TOA and TDOA measurement data and coordinates is established. The connection weights of neural network are estimated as the state variables of nonlinear dynamic system. The multilayer perceptron network is trained by the real-time neural network (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  13
    Topology Control and Medium Access Control (MAC) Protocol for Wireless Sensor Networks (WSNs) in Cyber-Physical System.Ang Li, Chen Zhang, Baoyu Zheng & Lei Li - 2021 - Complexity 2021:1-12.
    The system reachability set is calculated by covering all possible behaviours of the system through a finite number of simulation steps to ensure that the system trajectory stays within a set safety region. In this paper, the theory of the game method is applied to the design of the controller, a very small controller is designed, and good control results are obtained by simulation. The system gradually shows a divergent trend and cannot achieve stable control. A multihop channel reservation Medium (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  13
    Complementary frequency selective surface pair-based intelligent spatial filters for 5G wireless systems.Pradeep Kumar, Ranjan Mishra & Ankush Kapoor - 2021 - Journal of Intelligent Systems 30 (1):1054-1069.
    Frequency selective surface -based intelligent spatial filters are capturing the eyes of the researchers by offering a dynamic behavior when exposed to the electromagnetic radiations. In this manuscript, a concept of creating complementary structures which stems from Babinet’s principle is illustrated. A hybrid complementary pair of FSS comprising double square loop FSS and double square slot FSS on either side of the dielectric substrate is proposed. DSLFSS offers band-pass behavior and can be placed as a superstrate, whereas DSSFSS behaves as (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  14
    When the cables leave, the interfaces arrive: Immaterial networks and material interfaces.Laura Beloff - 2006 - Technoetic Arts 4 (3):211-220.
    The last decade has seen the dawn of a technological development towards a wireless-networked world. Various mobile interfaces have started to appear like laptop computer, PDA, mobile phone, Blueberry. The zenith of this development is the full distribution of computation and networks into every aspect of our life. Everything will become an interface, from a cup to a shirt. Wireless networks and multifarious interfaces will blend invisibly into our everyday life and environment. This emerging infrastructure and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  11
    IoT network security using autoencoder deep neural network and channel access algorithm.Mustafa Musa Jaber, Amer S. Elameer & Saif Mohammed Ali - 2021 - Journal of Intelligent Systems 31 (1):95-103.
    Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  14
    Smart Congestion Control in 5G/6G Networks Using Hybrid Deep Learning Techniques.Saif E. A. Alnawayseh, Waleed T. Al-Sit & Taher M. Ghazal - 2022 - Complexity 2022:1-10.
    With the mobility and ease of connection, wireless sensor networks have played a significant role in communication over the last few years, making them a significant data carrier across networks. Additional security, lower latency, and dependable standards and communication capability are required for future-generation systems such as millimeter-wave LANs, broadband wireless access schemes, and 5G/6G networks, among other things. Effectual congestion control is regarded as of the essential aspects of 5G/6G technology. It permits operators to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  12
    Communication Network for Sports Activity Monitoring Systems.Yuhua Li, Lishuang Wan & Haimin Zhang - 2021 - Complexity 2021:1-10.
    In this paper, through research and analysis of the communication network of the physical activity monitoring system, we combine wearable technology and identification technology and design a physical health monitoring bracelet that integrates multifaceted physical data collection and effective identity matching function. We match the identity through the chip and collect the physical fitness data generated in the process of exercise and centralized test by the sensor in real-time. Finally, the data transmission is realized through the WIFI communication function to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  22
    NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File.Hans-Wolfgang Loidl, Peter J. B. King & Idris Skloul Ibrahim - 2015 - Journal of Intelligent Systems 24 (4):467-477.
    Ns2 is an open-source communications network simulator primarily used in research and teaching. Ns2 provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless networks. Although Ns2 is a widely used powerful simulator, it lacks a way to measure networks that are used to assess reliability and performance metrics and it does not analyse the trace files it produces. The data obtained from the simulations are not straightforward to analyse. Ns2 is still (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000