Search
Search Results
-
Systematical Classification Scheme Management to Provide Efficient National R&D Service in P2P
It is necessary to systematically classify and manage contents in various fields for systematic management, accurate analysis and efficient service...
-
Estimation method of airspace connectivity probability in military AANET
Connectivity is the premise and foundation of networking and routing. For the probabilistic flight path of military aircraft resulting in the...
-
Energy-saving scheduling for LTE multicast services
In the Long Term Evolution (LTE) downlink multicast scheduling, Base Station (BS) usually allocates transmit power equally among all Resource Blocks...
-
An adaptive-weighted two-dimensional data aggregation algorithm for clustered wireless sensor networks
In this paper, an Adaptive-Weighted Time-Dimensional and Space-Dimensional (AWTDSD) data aggregation algorithm for a clustered sensor network is...
-
An identity-based key agreement scheme for large scale sensor networks
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key...
-
Declarative hybrid routing protocols in Ad hoc NETworks
This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the...
-
Web service selection algorithm based on principal component analysis
Existing Web service selection approaches usually assume that preferences of users have been provided in a quantitative form by users. However, due...
-
Utility optimization scheduling for multi-point video surveillance in ubiquitous network
Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless...
-
Service community construction method of internet of things based on semantic similarity
Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal...
-
An efficient UE cluster head selection algorithm in wireless sensor networks and cellular networks
Wireless Sensor Networks (WSNs) have been applied in many different areas. Energy efficient algorithms and protocols have become one of the most...
-
Localization algorithm based on minimum condition number for wireless sensor networks
During range-based self-localization of Wireless Sensor Network (WSN) nodes, the number and placement methods of beacon nodes have a great influence...
-
Relay algorithm based on network coding in wireless local network
The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy...
-
Ad Hoc LAN Protocol-Based Defense Wormhole Attack Method
As no Center, self-organization, changing topology and so on, the routing protocol security is more terrible in ad hoc network than in wired network.... -
A discrete time two-level mixed service parallel polling model
We present a discrete time single-server two-level mixed service polling systems with two queue types, one center queue and N normal queues....
-
Sensor network architecture for intelligent high-speed train on-board monitoring
The China’s high-speed railway is experiencing a rapid growth. Its operating mileage and the number of operating trains will exceed 45 000 km and...
-
A novel pfmac protocol for wireless sensor network based on prediction and feedback method
In view of the problem that existing Media Access Control (MAC) protocols can not provide real-time monitor on network conditions, this paper puts...
-
ZigID: Improving visibility in industrial environments by combining WSN and RFID
The objective of this work is to provide decision-making processes with an updated/real picture of the mobile resources in industrial environments...
-
Research on key nodes of wireless sensor network based on complex network theory
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network...
-
Reducing packet loss with protection tunnel based rerouting
It is well-known that today’s inter-domain routing protocol, Border Gateway Protocol (BGP), converges slowly during network failures. During the...
-
A reliability enhanced density adaptive data dissemination scheme for VANETs
In this paper, a reliability enhanced and density adaptive data disseminating scheme is proposed for Vehicular Ad hoc NETworks (VANETs). The...