We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Anticipative and Non-anticipative Controller Design for Network Control Systems

    We propose a numerical procedure to design a linear output-feedback controller for a remote linear plant in which the loop is closed through a...
    Payam Naghshtabrizi, João P. Hespanha in Networked Embedded Sensing and Control
    Chapter
  2. Q-Learning Based Load Balancing in Heterogeneous Networks with Human and Machine Type Communication Co-existence

    A heterogeneous network, also known as a HetNet, is a network made up of numerous distinct wireless network nodes placed throughout the cellular...

    Amaal S. A. El-Hameed, Khaled M. F. Elsayed in Wireless Personal Communications
    Article 08 July 2024
  3. Path Planning of Mobile Robots Under Uncertain Navigation Environments Using FCM Clustering ANFIS

    In this paper an improved multiple adaptive neuro-fuzzy inference system (MANFIS) to solve the wheeled mobile robots path planning in unstructured...

    Prases Kumar Mohanty in Wireless Personal Communications
    Article 08 July 2024
  4. A Pragmatic Review of QoS Optimisations in IoT Driven Networks

    With advent of Internet of Things (IoT) an exponential growth has been observed in recent times towards the use of fifth generation (5G) network to...

    Satyabrat Sahoo, Satya Prakash Sahoo, Manas Ranjan Kabat in Wireless Personal Communications
    Article 08 July 2024
  5. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  6. English listening and speaking ability improvement strategy from Artificial Intelligence wireless network

    With the rapid development of science and technology, there are many derivatives of Artificial Intelligence (AI) technology based on wireless...

    Nan Hu in Wireless Networks
    Article 08 July 2024
  7. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  8. UWB Wireless Positioning Method Based on LightGBM

    In the ultra-wideband indoor positioning sceneraio, the non-line of sight (NLOS) propagation may be caused by obstacles, which may lead to the...

    Xuerong Cui, Yuanxu Li, ... Jianhang Liu in Wireless Personal Communications
    Article 08 July 2024
  9. Research on Power Control Routing Algorithm for Wireless Sensor Networks Based on Ant Colony Optimization

    Improving node energy consumption efficiency to increase network survival time is one of the main research priorities in wireless sensor networks...

    Jian’qiang He, Zhijun Teng, Fan Zhang in Wireless Personal Communications
    Article 08 July 2024
  10. TDOA and FDOA Hybrid Positioning of Mobile Radiation Source with Receiver Position Errors

    High-precision position awareness is essential to ubiquitous wireless networks, which can provide real-time position information and abundant status...

    Yue Zhang, Fen He, ... Zhu **ao in Wireless Personal Communications
    Article 08 July 2024
  11. Experimental Investigation on Insulation Performance of SO2/CO2 Gas Mixtures

    In an effort to replace the use of SF 6 gas in high-voltage equipment, research has been conducted on more environmentally favorable alternative gases...

    Akhilesh Kumar Pandey, Pushpendra Singh, ... Jitendra Kumar Singh in Journal of The Institution of Engineers (India): Series B
    Article 08 July 2024
  12. End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks

    Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...

    Gourav Prateek Sharma, Wouter Tavernier, ... Ingrid Moerman in Journal of Network and Systems Management
    Article Open access 08 July 2024
  13. JAYA NL-WSN: Jaya Algorithm for Node Localization Issue in Wireless Sensor Network

    The process of discovering the location of occurring event is critical task in wireless sensor network but it is foremost necessity of various...

    Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur in Wireless Personal Communications
    Article 08 July 2024
  14. Performance Analysis of NR 5G Cellular Vehicle to Everything Communication in Mode 3

    In the future, intelligent transportation systems will rely heavily on vehicle to vehicle (V2V) communication-based cooperative vehicular networks...

    Deepak Kumar Nayak, Anshuman Singh, ... Sumit Kundu in Wireless Personal Communications
    Article 08 July 2024
  15. DenseNet-121 Model for Diagnosis of COVID-19 Using Nearest Neighbour Interpolation and Adam Optimizer

    The pandemic of COVID-19 has caused disaster all over the world since its outbreak. It is a disease which affects the respiratory system of patient...

    Pooja Pradeep Dalvi, Damodar Reddy Edla, B. R. Purushothama in Wireless Personal Communications
    Article 08 July 2024
  16. Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem

    In common threshold secret image sharing (t, n) schemes, each of n shareholders has a share of secret image S. By having at least t shares, the...

    Massoud Hadian Dehkordi, Samaneh Mashhadi, ... Mohammad Hossein Noorallahzadeh in Wireless Personal Communications
    Article 08 July 2024
  17. IAFPN: interlayer enhancement and multilayer fusion network for object detection

    Feature pyramid network (FPN) improves object detection performance by means of top-down multilevel feature fusion. However, the current FPN-based...

    Zhicheng Li, Chao Yang, Longyu Jiang in Machine Vision and Applications
    Article 08 July 2024
  18. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  19. Investigation of the Seasonal Impact of Diversity Gain and Improvement Factors on Signal Availability in Tropical Location

    A satellite communication signal suffers from attenuation due to rain, and this offers many problems for effective signal transfer and quality,...

    M. A. Sodunke, J. S. Ojo, ... Arijit De in Wireless Personal Communications
    Article 08 July 2024
  20. Research on the Gait Phase Analysis Method of Femoral Amputation Patients Based on the Thin Film Pressure Sensor

    The running-in of amputees and prostheses usually requires a long time. Many objective evaluation parameters must be obtained to fit prosthetic...

    Ning Liu, Xueqin Liu, ... **gxiao Wang in Wireless Personal Communications
    Article 07 July 2024
Did you find what you were looking for? Share feedback.