We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 101-120 of 9,320 results
  1. Data Security Complications on Computing Technology in Mobile Cloud

    Mobile devices resource limitations are a direct result of mobile computing rapid development. Nowadays, the gadget that was primarily used to...
    Conference paper 2024
  2. Back to Wireless Basics

    In this chapter, we go back to wireless basics and discuss the challenges and limitations that are inherent in wireless communications as compared to...
    Anil Kumar, Jafer Hussain, Anthony Chun in Connecting the Internet of Things
    Chapter 2023
  3. Optimal multiuser uplink data detection for 5G communication networks

    The complex channel fading statistics and large antenna array employed in massive multiple input and multiple outputs (MIMO) for uplink and downlink...

    Madhusmita Sahoo, Harish Kumar Sahoo in International Journal of Information Technology
    Article 25 January 2024
  4. Stacked denoising autoencoder for missing traffic data reconstruction via mobile edge computing

    Traffic sensing system requires to periodically collect spatial–temporal traffic data distributed among road networks, which results in overhigh...

    Penglin Dai, **gtao Luo, ... **ao Wu in Neural Computing and Applications
    Article 26 March 2023
  5. A Hybrid Optimization Driven Deep Residual Network for Sybil Attack Detection and Avoidance in Wireless Sensor Networks

    Small Sensor nodes that can sense, store, and send data make up a wireless sensor network (WSN). In addition, the sensor nodes are limited when it...
    Anupama Bollampally, Anil Kumar Bandani, Sravani Pangolla in Intelligent Computing for Sustainable Development
    Conference paper 2024
  6. Energy aware African buffalo-based optimized dynamic media access control protocol for mobile Adhoc network environment

    The Media Access Control (MAC) protocol has been adopted and functioned in many network applications to share data between network users. However,...

    G. Sherlin Shobitha, B. Prabhakar, Girish Chandra Ghivela in International Journal of Information Technology
    Article 03 September 2023
  7. Anonymity and security improvements in heterogeneous connected vehicle networks

    The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and...

    S. A. Sivasankari, Deepak Gupta, ... Haewon Byeon in International Journal of Data Science and Analytics
    Article 16 January 2024
  8. Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey

    The research in Underwater Wireless Sensor Networks (UWSNs) has gained momentum over the last two decades owing to the vast applications it supports...

    Roshani V. Bhaskarwar, Dnyandeo J. Pete in SN Computer Science
    Article 29 June 2021
  9. Clustering with a high-performance secure routing protocol for mobile ad hoc networks

    Mobile ad hoc networks (MANETs) comprise a collection of independent, compact-sized, and inexpensive sensor nodes, which are commonly used to sense...

    Maganti Srinivas, M. Ramesh Patnaik in The Journal of Supercomputing
    Article 13 January 2022
  10. Mobility-aware computational offloading in mobile edge networks: a survey

    Technological evolution of mobile devices, such as smart phones, laptops, wearable and other handheld devices have come up with the emergence of...

    Sardar Khaliq uz Zaman, Ali Imran Jehangiri, ... Waleed Alasmary in Cluster Computing
    Article 09 April 2021
  11. Performance evaluation and downstream system planning based energy management in LTE systems

    The Mobile Edge Computing is a novel prototype that was developed recently due to the benefits and expanding nature of electronic data-processing...

    Saumen Dhara, Soumya Das, Alok Kumar Shrivastav in Multimedia Tools and Applications
    Article 10 May 2023
  12. An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels

    In mobile wireless broadcast networks, XML data is encrypted before it is sent over the broadcast channel in order to ensure the confidentiality of...

    Madeh Shokri, Meghdad Mirabi in The Journal of Supercomputing
    Article 17 June 2019
  13. Review on mobility aware MAC protocol using Mobile internet of things

    Modern boom and understanding of our growing needs, applications based on the Mobile Internet of Things (MIoT) are becoming important for future...

    V. C. Diniesh, G. Murugesan in Multimedia Tools and Applications
    Article 26 April 2022
  14. Opportunistic Networks: An Empirical Research of Routing Protocols and Mobility Models

    Opportunistic networks (OppNets) are a sub-part of (delay-tolerant networks) DTNs but are quite different from it. OppNets do not need any end-to-end...

    Khaleel Ahmad, Muneera Fathima, ... Khairol Amali Bin Ahmad in SN Computer Science
    Article 28 August 2023
  15. Cellular Goore Game and its application to quality-of-service control in wireless sensor networks

    The Goore Game (GG) is a model for collective decision-making under uncertainty, which can be used as a tool for stochastic optimization of a...

    Reyhaneh Ameri, Mohammad Reza Meybodi, Mohammad Mehdi Daliri Khomami in The Journal of Supercomputing
    Article 14 April 2022
  16. RF and Wireless Technologies

    We began Chapter 6 by discussing the differences between Analog and Digital signals and the various...
    Corey Richard in Understanding Semiconductors
    Chapter 2023
  17. A Service-Oriented Middleware Enabling Decentralised Deployment in Mobile Multihop Networks

    The number of computing devices, mostly smartphones is tremendous. The potential for distributed computing on them is no less huge. But develo**...
    Conference paper 2023
  18. A priority aware local mutual exclusion algorithm for flying ad hoc networks

    In Flying Ad Hoc Networks (FANETs), the critical resource resides in an Unmanned Aerial Vehicle (UAV) and the user nodes within the UAV’s...

    Kapilesh Guruprasad, Dhanush Sridhar, ... Mary Anita Rajam Viswasam in Computing
    Article 30 January 2024
  19. A Distributed Cross-Layer Protocol for Sleep Scheduling and Data Aggregation in Wireless Sensor Networks

    We propose a Cross-layer Protocol for Sleep scheduling and Data aggregation (CPSD) in Wireless Sensor Networks (WSNs) to improve the performance in...
    Conference paper 2024
  20. Mobile crowdsensing with energy efficiency to control road congestion in internet cloud of vehicles: a review

    Traveling demand increased rapidly on the roads of big cities. Traffic congestion is observed on a regular basis and causes serious problems for...

    Zaheen Fatima, Aqeel Ur Rehman, ... Asif Ali Laghari in Multimedia Tools and Applications
    Article 28 November 2023
Did you find what you were looking for? Share feedback.