We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 108 results
  1. Systematical Classification Scheme Management to Provide Efficient National R&D Service in P2P

    It is necessary to systematically classify and manage contents in various fields for systematic management, accurate analysis and efficient service...

    Wongoo Lee, Han** Cho, Kangryul Shon in Wireless Personal Communications
    Article 03 November 2015
  2. Estimation method of airspace connectivity probability in military AANET

    Connectivity is the premise and foundation of networking and routing. For the probabilistic flight path of military aircraft resulting in the...

    Changyuan Luo, Yulong Song, Songchao Pang in Journal of Electronics (China)
    Article 14 December 2013
  3. Energy-saving scheduling for LTE multicast services

    In the Long Term Evolution (LTE) downlink multicast scheduling, Base Station (BS) usually allocates transmit power equally among all Resource Blocks...

    Keke Deng, bin Wang, ... Wennai Wang in Journal of Electronics (China)
    Article 22 October 2013
  4. An adaptive-weighted two-dimensional data aggregation algorithm for clustered wireless sensor networks

    In this paper, an Adaptive-Weighted Time-Dimensional and Space-Dimensional (AWTDSD) data aggregation algorithm for a clustered sensor network is...

    Junhu Zhang, **ujuan Zhu, Hui Peng in Journal of Electronics (China)
    Article 14 December 2013
  5. An identity-based key agreement scheme for large scale sensor networks

    To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key...

    Lijun Yang, Meng Wu, Chao Ding in Journal of Electronics (China)
    Article 14 December 2013
  6. Declarative hybrid routing protocols in Ad hoc NETworks

    This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the...

    **ang Gao, Zhongyuan Li, Min Wang in Journal of Electronics (China)
    Article 18 July 2013
  7. Web service selection algorithm based on principal component analysis

    Existing Web service selection approaches usually assume that preferences of users have been provided in a quantitative form by users. However, due...

    Guosheng Kang, Jianxun Liu, ... Buqing Cao in Journal of Electronics (China)
    Article 23 February 2013
  8. Utility optimization scheduling for multi-point video surveillance in ubiquitous network

    Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless...

    Chen Zhang, Liusheng Huang, Hongli Xu in Journal of Electronics (China)
    Article 30 January 2013
  9. Service community construction method of internet of things based on semantic similarity

    Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal...

    Yang Wang, Lin**g Zhang, ... Chuanxin Zhao in Journal of Electronics (China)
    Article 08 January 2013
  10. An efficient UE cluster head selection algorithm in wireless sensor networks and cellular networks

    Wireless Sensor Networks (WSNs) have been applied in many different areas. Energy efficient algorithms and protocols have become one of the most...

    Shan Lianhai, Yuling Ouyang, ... Honglin Hu in Journal of Electronics (China)
    Article 17 January 2013
  11. Localization algorithm based on minimum condition number for wireless sensor networks

    During range-based self-localization of Wireless Sensor Network (WSN) nodes, the number and placement methods of beacon nodes have a great influence...

    **aoyu Du, Lijuan Sun, ... Ruchuan Wang in Journal of Electronics (China)
    Article 14 January 2013
  12. Relay algorithm based on network coding in wireless local network

    The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy...

    Qi Wang, Qingshan Wang, Dongxue Wang in Journal of Electronics (China)
    Article 16 January 2013
  13. Ad Hoc LAN Protocol-Based Defense Wormhole Attack Method

    As no Center, self-organization, changing topology and so on, the routing protocol security is more terrible in ad hoc network than in wired network....
    Chapter 2012
  14. A discrete time two-level mixed service parallel polling model

    We present a discrete time single-server two-level mixed service polling systems with two queue types, one center queue and N normal queues....

    Zheng Guan, Dongfeng Zhao, Yifan Zhao in Journal of Electronics (China)
    Article 01 March 2012
  15. Sensor network architecture for intelligent high-speed train on-board monitoring

    The China’s high-speed railway is experiencing a rapid growth. Its operating mileage and the number of operating trains will exceed 45 000 km and...

    **ao-fan Wu, Chun Chen, ... Gang Chen in Journal of Zhejiang University-SCIENCE A
    Article 01 December 2011
  16. A novel pfmac protocol for wireless sensor network based on prediction and feedback method

    In view of the problem that existing Media Access Control (MAC) protocols can not provide real-time monitor on network conditions, this paper puts...

    Yaqiu Liu, Li Bian, ... Qianlong Zhang in Journal of Electronics (China)
    Article 01 November 2011
  17. ZigID: Improving visibility in industrial environments by combining WSN and RFID

    The objective of this work is to provide decision-making processes with an updated/real picture of the mobile resources in industrial environments...

    Pablo García Ansola, Andrés García, ... Francisco Javier Otamendi in Journal of Zhejiang University-SCIENCE A
    Article 01 November 2011
  18. Research on key nodes of wireless sensor network based on complex network theory

    On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network...

    Chuang Ma, Hongwei Liu, ... **aozong Yang in Journal of Electronics (China)
    Article 01 May 2011
  19. Reducing packet loss with protection tunnel based rerouting

    It is well-known that today’s inter-domain routing protocol, Border Gateway Protocol (BGP), converges slowly during network failures. During the...

    Hailong Ma, Yunfei Guo, Dongnian Cheng in Journal of Electronics (China)
    Article 01 May 2011
  20. A reliability enhanced density adaptive data dissemination scheme for VANETs

    In this paper, a reliability enhanced and density adaptive data disseminating scheme is proposed for Vehicular Ad hoc NETworks (VANETs). The...

    Lianke Zhou, Gang Cui, ... Hongwei Liu in Journal of Electronics (China)
    Article 01 January 2011
Did you find what you were looking for? Share feedback.