نتایج جستجو برای: wireless

تعداد نتایج: 108490  

S. M. Hosseinirad

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

اسماعیل پور, منصور, ختن لو, حسن, طالبیان, فائزه,

Recent advances in wireless electronic and communications provide us the ability to build small, economical sensors with low power consumption and many diverse applications. Limited energy capacity of sensors is a huge challenge that will affect these networks. Clustering has been used as a well-known method to handle this challenge. To find appropriate location of clusters' heads, imperialist ...

A. Aminian Modarres, M. Kafaee Razavi R. Javanrouh Givi

With respect to the dramatic increasing use of electronically communicators and wireless modems, concerns have been raised about the possible effects of emitted electromagnetic radiation on human brain. In this paper, the effects of high-frequency wireless modem waves on the brain signal are investigated. To this end, the Electroencephalograph (EEG) recording of 15 volunteers is examined in fou...

Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery operated and there is no possibility of charging or replacing the batteries, the lifetime of ...

Journal: :CAIS 2002
Robert Boncella

The physical transport methods used in wireless communication differ from wired communication. These differences affect how a secure channel can be established in a wireless environment. The purpose of this tutorial is to provide an overview of how a secure channel is set up in a wireless environment that uses the 802.11 or WAP standards.

Journal: :journal of computer and robotics 0
fereydoon abdi faculty of computer and information technology engineering qazvin branch islamic azad university qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering qazvin branch islamic azad university qazvin, iran

wireless sensor networks attracting a great deal of research interest. accurate localization of sensor nodes is a strong requirement in a wide area of applications. in recent years, several techniques have been proposed for localization in wireless sensor networks. in this paper we present a localization scheme with using only one mobile anchor station and received signal strength indicator tec...

Journal: :EURASIP J. Information Security 2013
Jonny Milliken Valerio Selis Alan Marshall

This paper analyses and proposes a novel detection strategy for the ‘Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The research here describes development of an objective measure of virus success, the impact of product susceptibility, the acceleration of infection and the growth of the physical area covered by t...

2014
Shicong Yang

Access Point Selection for Multi-Rate IEEE 802.11 Wireless LANs

Journal: :IJCNS 2011
Salman AlQahtani Ahed Alshanyour Ashraf S. Hasan Mahmoud

This paper introduces a packet reservation multiple access (PRMA) with random contention for fixed wireless access communications. The performance of PRMA scheme with random contention is compared with the performances of traditional PRMA under permission contention scheme. The proposed scheme is a simpler contention mechanism that does not depend on a pre-determined permission probability as P...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید