wireless sensor network sensor networks manet ubiquitous computing wireless sensor networks wsn ad hoc computing graph theory energy mac aodv clustering energy consumption security routing ad hoc networks energy conservation throughput vr/ar streaming end-to-end delay manets high speed networks adhoc and sensor networks connectivity network lifetime. data management issues wireless ad hoc networks wireless internet of things (iot) preemptive dsr qos sensor network internet and web applications heterogeneous wireless networks collision packet error lora internet of things cognitive agents sensor visible light communication bluetooth addressing and location management ad hoc networks of autonomous intelligent systems architectures routing protocols biometric security energy efficient routing protocols mobile ad-hoc networks routing overhead protocol infrared sensor white-cane visible impaired person authentication access control python database rfid bs. aca scp smt srp compromised nodes algorithms hop load balance network security network architectures 6lowpan chirp spread spectrum css lpwan experiments ibeacons broadcasting bluetooth low energy mobile adhoc network’s sleep aodv opportunistic network routing factor redundant mobile robot relocation cloud computing intelligent community system virtualization thin client coverage energy efficiency gps design guidelines interaction techniques gestures. organic user interface tangible interfaces routing protocol quality of service energy-efficiency technology computing signal processing protocols and algorithms key management applications mobile network communications computer networks machine learning security and privacy resource allocation work models big data / cloud computing and networks multipath routing rate control drqos gbdeer protocol coap rpl iot bee colony algorithm multi-hop relay ieee 802.16j wireless relay networks healthcare squashing function bayesian estimator soft computing genetic algorithm fuzzy logic neural nets wlan wi-fi wimax inverted-f antenna adhoc networks network lifetime network disconnection. transaction recovery transaction log flash memory mobile transactions network trust packet scheduling learning automata distance sinkhole attack secured gpsr gpsr protocol non-line-of-sight (nlos) angle of arrival (aoa) time of arrival (toa) mac layer delivery ratio probability link distance shadowing connectivity analysis under different mobility mod distributed extensions of centralized graph theore blockchain networks mobile networks & wireless lan network protocols & wireless networks mobile & broadband wireless internet wireless communication rsu vanet android mobile development domain specific language embedded sensors model driven architecture free space optics dsdv ad hoc networks and on-demand routing protocols. dynamic source routing (dsr) context ubiquitous mobile computing rule-based approach context-awareness single copy routing scheme social based routing delay tolerant networks distributed file system. packet delivery ratio deployment knowledge its v2i v2v mobile phone cctv origin destination matrix sensor node cooperation communication optimal power allocation amplify-and-forward mimo cooperative distributed technology quantum computing problem solving education in computational sci hardware and os issues compiler computation models scientific computing ai in network line of sigh ubiqitious adhoc recent computing sensors software security trust management security engineering quantum cryptography security management information hiding fuzzy systems data integrity cryptography and coding artificial immune systems cs education kla kinesthetic learning activity unidirectional ring arbitrary directed graph scheduling network routing routing messages real time routing iot applications and services security and privacy for iot image processing communication systems vlsi design deployments and implementations communication network architectures and design communication network protocols boundary control devices broadband access networks secure cloud computing grid security electronic commerce humid tropical climate corrosion time of wetness atmospheric aggressiveness mobile ad hoc learning heterogeneous wsn ch selection ch frequency baseband modulation artificial intelligence mobile computing wireless networks etx exor wireless & mobile network security visualization of sensor data cyber-physical system (cps) data and knowledge representation unified security mechanism jamming attack rts/cts pcf opnet simulation transformer model recurrent neural networks chunking natural language processing- named entity recognit design decisions and philosophies architectural structure distributed computing semantics-driven language processing. natural vs. artificial intelligence natural logic vehicle-to-everything (v2x) and autonomous cars human-computer-interaction. learning environments classroom acts literacy adult education power nodes power control real-time data delivery. communication versus computation energy consumptio low power design services and applications information / content centric networks (icn) remote display thin clients mobile devices next generation internet  big data / cloud computing and networks coverage. elliptic curve cryptography. key usage storage space  data gathering algorithms and protocols for sens  connectivity analysis under different mobility m  distributed extensions of centralized graph theo home or commercial and require a highly secured co ecology comprising military and bandwidth. their occupation depends on inspect power communication range wsn is formed by autonomous nodes with partial mem big data mining big data infrastructure and platform models and algorithms big data techniques life time power aware data gathering and transmission power. signal-to-interference-plus-noise power ration (si wban survey. body sensor network wireless body area network adaption tree digital convergence  cloud computing  advanced it bio/ medical engineering cbr vbr olsr mobility models linear programming problem. optimal flow minimum energy cost routing lifetime of wireless sensor network battery power routing. localization data fusion vehicular ad hoc and sensor network (vasnet) vehicular ad hoc networks (vanet) mobile ad hoc networks (manet) wireless sensor networks (wsn) police patrols aggregation context summarization secure routing location privacy distributed resource allocation asynchronous distributed pricing game theory congested flow free flow message propagation vehicular ad hoc network delay fairness contention window aetf mimd mild cbc hierarchical sensor network. clock synchronization ad hoc tree structure latency. medium acess control mobility on-demand routing protocols mobile ad-hoc network greedy heuristic target coverage problem fabrication remote monitoring integrity data confidentiality privacy control confidence participatory sensing pervasive computing performance intermittent connectivity w-man opportunistic networks push-pull concept vehicular ad hoc networks mobility. flooding reactive routing network protocols ad hoc dissipation efficiency lead leach energy factor lid anda military sensor networks (msn). agent discrete wavelet transform (dwt) image fusion context aware analytical hierarchy process statistical analysis stochastic deployments daylight substitution. minutiae point decryption encryption fingerprint throughput. end to end delay tora identity management survey idm taxonomies digital identity access management identity management trust. trapdoors hybrid covert channel subliminal channel covert channel compressive data gathering data aggregation and data gathering mobile communication data reputation knowledge base management hyper-resolution-rule distributed constraint satisfaction problem arq bit error rate wireless channel adaptive fec packet loss ratio. clusters multi-constrained routing multicasting saved rebroadcast probabilistic routing reachability parameter broadcast storm isi sdr rrc ber hdtv fair and efficient ieee 802.16 idsq beacon communication range range based location scheme location sensing mobile sink ad hoc network cluster connected dominating set secure routing protocol report fabrication attack cluster based wireless sensor network experimentation design transmission power. signal-to-interference-plus-noise power ration secure routing algorithms and protocols based on g evacuation routing algorithms and protocols for ve algorithms for topology control and power assignme algorithms for scheduling and resource allocation approximation heuristics for np-complete problems data gathering algorithms and protocols for sensor applications of random graph theory in ad hoc netw computer multimedia networking network based applications network operations & management measurement & performance analysis remote control obu delay. nodes line of sight adaption t proactive routing protocols reactive routing protocols hybrid routing protocols hole healing coverage holes wireless sensor network. infrared ray communication keyless entry system radio range. wsns (wireless sensor networks) shortest path algorithm ssid wireless lan encryption key dynamic path switching energy efficient routing zrp packet loss pdf ad-hoc networks vanets ieee mac 802.11 congestion control dsr tcp cross layer information counterattacks and wireless sensor network attacks fl oating-point data lossless compression pervasive system; smart space; resource mobility; protocols and algorithms air pollution zigbee grph massage mact massage raodv maodv tcp variants mobile ad hoc networks trust establishment third party key agreement secure channel. wireless sensor network (wsn); clustering; cluster asymmetrical sensor networks lifetime gur game
Mehr anzeigen