intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Using a wireless network

Xem 1-20 trên 206 kết quả Using a wireless network
  • This study proposes a Hybrid Genetic algorithm (HGA) to solve SPG. This study is the binary string representation for a set of chosen edges. To increase the diversity of the population and avoid falling into local optimization, we use a 2-longest Distance strategy, dynamic crossover rate, and chosen solutions must differ by at least 5%.

    pdf5p vialicene 19-07-2024 2 0   Download

  • Radio over Fiber (RoF) stands as a cuttingedge technology poised to revolutionize emerging wireless networks, especially in the context of fifth-generation Cloud-Radio Access Networks (C-RAN). Concurrently, with the pervasive integration of deep learning across diverse domains such as communication and data processing, this investigation delves into the nonlinear effects observed in a fronthaul interface.

    pdf6p vithomson 02-07-2024 0 0   Download

  • In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.

    pdf10p vithomson 02-07-2024 0 0   Download

  • This paper addresses the challenge of fault detection in Wireless Sensor Networks (WSNs), commonly used in fields like environmental monitoring and healthcare. WSNs, prone to various faults due to their deployment in unpredictable environments, require effective solutions for fault detection. Traditional machine learning approaches show limitations such as unsuitability for streaming data and the detection of a single fault type.

    pdf10p visergeyne 18-06-2024 1 0   Download

  • This paper proposes using a non-linear system to generate chaos-based coefficient sequences applied in the sensor nodes of a landslide warning system. The experimental study demonstrated that the sensor node utilizing pseudo-random sampling is faster and less complex in comparison to the sensor node employing random sampling.

    pdf8p visergeyne 18-06-2024 0 0   Download

  • Part 1 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: analysis of ISSP environment II survey data using variable clustering; polar transformation system for offline handwritten character recognition; examining QoS guarantees for real-time CBR services in broadband wireless access networks; sin and sigmoid higher order neural networks for data simulations and predictions; a proposal of mouth shapes sequence code for Japanese pronunciation;...

    pdf90p khuynhlinhnguyet1009 05-04-2024 3 1   Download

  • The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will find its proceedings useful and valuable to read.

    pdf182p longtimenosee05 31-03-2024 2 0   Download

  • Part 1 of ebook "Linux networking cookbook™" includes content: introduction to Linux networking; building a Linux gateway on a single-board computer; building a Linux firewall; building a Linux wireless access point; building a VoIP server with asterisk; routing with Linux; secure remote administration with SSH; using cross-platform remote graphical desktops;...

    pdf329p longtimenosee03 22-02-2024 3 3   Download

  • This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.

    pdf8p vimarillynhewson 02-01-2024 6 3   Download

  • Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 2 includes contents: Chapter 10 An overview of 3G; chapter 11 Advanced 3G programming; chapter 12 3G programming using BREW; chapter 13 voice and video communication over IP and Mobile IP Networks; chapter 14 the future of wireless networks; appendix a what ’s on the CD-ROM; appendix b tomcat installation and configuration; appendix c SQL server 2000 installation and XML support configuration; appendix d bluetooth reference and resources; appendix e 3G reference and resources.

    pdf211p haojiubujain010 14-12-2023 7 3   Download

  • Ebook Web services security and e-business: Part 1 includes contents: Chapter I Wireless LAN setup and security loopholes; Chapter II Wireless web security using a neural network-based cipher; Chapter III RFID systems: Applications vs. security and privacy implications; Chapter IV Mobile code and security issues; Chapter V A survey of key generation for secure multicast communication protocols;…

    pdf200p haojiubujain06 06-09-2023 12 4   Download

  • This research investigates other built-in sensors and develops methods for improving the accuracy of indoor positioning. Combination with the wireless network, it can be a viable alternative solution for the indoor positioning purposes of the smartphone users. The main advantage of this solution is that it can be deployed with a minimal cost, as no specialized hardware is necessary for setting up the system.

    pdf91p runthenight05 01-03-2023 5 2   Download

  • This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks.

    pdf123p runthenight07 01-03-2023 3 2   Download

  • In this thesis, the limitations of using existing LTE congestion mitigation mechanisms such as Discard Timer and RED have been explored. A different mechanism to analyse the effects of using control theory for congestion mitigation has been developed. Finally, congestion mitigation in LTE networks has been addresses using radio resource allocation techniques with non-cooperative game theory being an underlying mathematical framework.

    pdf118p runthenight04 02-02-2023 2 1   Download

  • This work investigates the robust beamforming for a multi-antenna internet of things (IoT) system using wireless information and power transmission (WIPT), given that imperfect channel state information (CSI) assumption is accounted. In particular, we investigate the problem of maximizing the worst-case energy harvested, taking into account the quality of service (QoS) constraint of user rate.

    pdf6p viargus 20-02-2023 6 3   Download

  • In this paper, a survey of recent power managing techniques is presented. It provides an insight into how they can be used and orchestrated so that satisfactory performance can be achieved within a given energy budget. Moreover, the advantages and also drawbacks are analyzed to provide users with a good comprehension of power managers for a better choice.

    pdf4p vijaguar 16-11-2022 14 2   Download

  • In this paper, the issue of arranging and routing the nodes in the sensor network in a hierarchical manner is investigated, in which each lowest level sensor nodes are grouped in a cluster with a common cluster head, then the cluster-head plays an intermediate role transmit the information back and forth between the sensor nodes and the base station.

    pdf8p vimelindagates 18-07-2022 10 4   Download

  • In this paper, we introduce True Time, an open source Simulink package for simulation of networked control systems. By using True Time, we present an analysis and evaluation of the effects of communication network to the performance of a wireless process control system.

    pdf5p vichristinelagarde 04-07-2022 9 1   Download

  • This paper suggests a solution to multi-connectivity deployment WSN coverage based on combining Sailfish optimizer (SFO) with the characteristic of 3D surface topography. The target area divided into mesh grids of a size to establish the multiconnectivity of every grid. The cover set constructed through the direction gradient probabilistic model and connected graph and the joint points to graph within the grid by optimizing SFO.

    pdf9p linyanjun_2408 21-04-2022 11 3   Download

  • This paper presents a solution to the power balance control strategy for WSN with collaborating heuristic. A distance between the weight factors and obtained nodes interference value is used to establish a useful interference model for enhancing the signal-to-interference-noise ratio (SINR). The utility function of the nodes residual energy and transmission rate is modeled by apply heuristic strategy. The optimal transmission power is obtained after several iterations of the heuristic algorithm.

    pdf11p linyanjun_2408 21-04-2022 19 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2