To see the other types of publications on this topic, follow the link: Mobile Wireless Networks.

Journal articles on the topic 'Mobile Wireless Networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile Wireless Networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alrashed, Ebrahim A., and Mehmet Hakan Karaata. "Imposter Detection in Mobile Wireless Sensor Networks." International Journal of Computer and Communication Engineering 3, no. 6 (2014): 434–41. http://dx.doi.org/10.7763/ijcce.2014.v3.364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pranjali, V. Gurnule. "Wireless Jamming Networks." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 1931–35. https://doi.org/10.31142/ijtsrd14455.

Full text
Abstract:
A mobile jammer is a device which is used to jam signals of a cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the working of a cell phone from not receiving signal from Base Station. This was implemented using FPGA by interfacing Mobile Device, RF Transmitter and RF Receiver and LCD Unit. Keywords-Jammers, Mobile Jammer, FPGA, RF Transmitter, RF Receiver, LCD Pranjali V Gurnule "Wireless Jamming Networks
APA, Harvard, Vancouver, ISO, and other styles
3

Kolios, Panayiotis, Vasilis Friderikos, and Katerina Papadaki. "Future Wireless Mobile Networks." IEEE Vehicular Technology Magazine 6, no. 1 (2011): 24–30. http://dx.doi.org/10.1109/mvt.2010.939905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

You, Ilsun, and Takahiro Hara. "Mobile and Wireless Networks." Mobile Information Systems 6, no. 1 (2010): 1–3. http://dx.doi.org/10.1155/2010/201674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

S.SivaNageswara Rao, Dr, Orchu Aruna, and Dr K.Lakshminadh. "Mobile ad hoc network integrated wireless networks: a survey." International Journal of Engineering & Technology 7, no. 1.9 (2018): 217. http://dx.doi.org/10.14419/ijet.v7i1.9.9827.

Full text
Abstract:
Now a day, every one using mobile devices for communicating with others. The development of new technologies, like Internet of Things (IoT) needs coverage, connectivity, scalability and QoS. In ubiquity networks, the major issues are coverage, connectivity, scalability and QoS. To solve these limitations, integrating wireless networks with ad hoc networks. This paper provides detail survey on how ad hoc networks are integrated with Cellular Network, Wireless Mesh Networks and Wireless Sensor Networks. This integration may resolve the problems of coverage, connectivity, scalability and QoS.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Xia, Jin Tang, and Hua Xiang. "Data Transmission Reliability Analysis of Wireless Sensor Networks for Social Network Optimization." Journal of Sensors 2022 (January 6, 2022): 1–12. http://dx.doi.org/10.1155/2022/3842722.

Full text
Abstract:
With the rapid development of the Internet in recent years, people are using the Internet less and less frequently. People publish and obtain information through various channels on the Internet, and online social networks have become one of the most important channels. Many nodes in social networks and frequent interactions between nodes create great difficulties for privacy protection, and some of the existing studies also have problems such as cumbersome computational steps and low efficiency. In this paper, we take the complex environment of social networks as the research background and f
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Dae-Young, Dae-sik Ko, and Seokhoon Kim. "Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6195024.

Full text
Abstract:
Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In additi
APA, Harvard, Vancouver, ISO, and other styles
8

Paliwal, Rakesh, and Irfan Khan. "Design and Analysis of Soft Computing Based Improved Routing Protocol in WSN for Energy Efficiency and Lifetime Enhancement." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 3 (2022): 12–24. http://dx.doi.org/10.17762/ijritcc.v10i3.5521.

Full text
Abstract:
Mobile wireless sensor networks have been developed as a result of recent advancements in wireless technologies. Sensors in the network are low-cost and have a short battery life, in addition to their mobility. They are more applicable in terms of the essential properties of these networks. These networks have a variety of uses, including search and rescue operations, health and environmental monitoring, and intelligent traffic management systems, among others. According to the application requirements, mobile wireless sensor nodes are energy limited equipment, so energy conservation is one of
APA, Harvard, Vancouver, ISO, and other styles
9

Gerla, Mario, Carla-Fabiana Chiasserini, Kenichi Mase, Eytan Modiano, and Jason Redi. "Mobile ad hoc wireless networks." Journal of Communications and Networks 6, no. 4 (2004): 291–94. http://dx.doi.org/10.1109/jcn.2004.6596848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gozalvez, Javier. "Heterogeneous Wireless Networks [Mobile Radio]." IEEE Vehicular Technology Magazine 6, no. 2 (2011): 9–13. http://dx.doi.org/10.1109/mvt.2011.941495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Varshney, Upkar, and Ron Vetter. "Emerging mobile and wireless networks." Communications of the ACM 43, no. 6 (2000): 73–81. http://dx.doi.org/10.1145/336460.336478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rodoplu, V., and T. H. Meng. "Minimum energy mobile wireless networks." IEEE Journal on Selected Areas in Communications 17, no. 8 (1999): 1333–44. http://dx.doi.org/10.1109/49.779917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Jeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.

Full text
Abstract:
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wi
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Yinying, Mirela I. Fonoage, and Mihaela Cardei. "Improving network lifetime with mobile wireless sensor networks." Computer Communications 33, no. 4 (2010): 409–19. http://dx.doi.org/10.1016/j.comcom.2009.11.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Oksiiuk, Oleksandr, and Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.

Full text
Abstract:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. M
APA, Harvard, Vancouver, ISO, and other styles
16

P., Poornima. "A STUDY ON 3G MOBILE COMMUNICATION TECHNOLOGY IN INDIA." Shanlax International Journal of Arts, Science and Humanities 6, S2 (2019): 250–58. https://doi.org/10.5281/zenodo.2650834.

Full text
Abstract:
<em>Third Generation (3G) mobile devices and services will transform wireless communications in to on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand. Mobile phones are rapidly becoming the preferred means of personal communication, creating the world&#39;s largest consumer electronics industry. Wireless data services are expected to see the same explosive growth in demand that Internet services and wireless voice services have seen in recent years. 3G is a wireless industry te
APA, Harvard, Vancouver, ISO, and other styles
17

Chavan, Pundalik, Dr K. Satyanarayan Reddy, and Sharada P N. "AN ANALYSIS OF WIRELESS NETWORKS." International Journal of Innovative Research in Advanced Engineering 9, no. 8 (2022): 288–99. http://dx.doi.org/10.26562/ijirae.2022.v0908.25.

Full text
Abstract:
Wireless networks have a unique capability of maintaining same contact even if one moves from one location to another. It provides the flexibility and versatility for wireless communications. The wireless and mobile communications have found usefulness in the area of commerce, education, defense, home-based and industrial applications, and military environment. Wireless networks have had a significant impact on the world through the use of wireless networks; information could be sent overseas or behind the enemy lines easily, efficiently and more reliably. Wireless networking is an essential p
APA, Harvard, Vancouver, ISO, and other styles
18

G., Sugumar, and T. Sathiyabama Mrs. "FPGA Based Wireless Jamming Networks." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 1215–17. https://doi.org/10.5281/zenodo.3589557.

Full text
Abstract:
A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the cell phone working not the signal receiving from Base Station, which make effective use of the situation where jammers actually used. This was implemented using FPGA by interfacing Mobile Device, RF Transmitter and RF Receiver and LCD Unit. G. Sugumar | Mrs. T. Sathiyabama &quot;FPGA Based Wireless J
APA, Harvard, Vancouver, ISO, and other styles
19

Bunga Dwiputriane, Daphne, and Swee Huay Heng. "Authentication for 5G Mobile Wireless Networks." Journal of Engineering Technology and Applied Physics 4, no. 1 (2022): 16–24. http://dx.doi.org/10.33093/jetap.2022.4.1.3.

Full text
Abstract:
Discussions regarding 5G mobile wireless networks frequently involve the impact they will create to our daily lives. Some view 5G as a disruption while some are questioning the need to deploy the network when conventional mobile networks are still performing optimally. The economic and lifestyle impact of 5G is rather subjective, but it is definite that there will be consequences to the security and privacy discussion sphere with an emphasis on authentication. As it arrives with new mechanisms, there is certainly a whole new attacking avenues to be capitalised. This paper surveys the state of
APA, Harvard, Vancouver, ISO, and other styles
20

Patkar, Ankit. "5G Wireless Technology." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1519–24. http://dx.doi.org/10.22214/ijraset.2022.40930.

Full text
Abstract:
Abstract: After the up rise of 4G wireless mobile technology takes place; researchers, mobile operator industries representative, academic institutions have started to look into the advancement (technological) towards 5G communication networks due to some main demands that are meliorated data rates, better capacity, minimized latency and better QoS (Quality of Service). To established the 5G mobile communication technological foundation, various research works or projects entailing main mobile infrastructure manufacturers, academia and international mobile network operators have been introduce
APA, Harvard, Vancouver, ISO, and other styles
21

Derakhshan, Farnaz, and Shamim Yousefi. "A review on the applications of multiagent systems in wireless sensor networks." International Journal of Distributed Sensor Networks 15, no. 5 (2019): 155014771985076. http://dx.doi.org/10.1177/1550147719850767.

Full text
Abstract:
Nowadays, the efficiency of multiagent systems in wireless sensor networks prompts the researchers to use these emerging mobile software packets in different simulated approaches or real-world applications. Heterogeneous and distributed wireless sensor networks could be integrated with the multiagent systems to map the real-world challenges into the artificial intelligence world. The multiagent systems have been applied from simulated approaches like object detection/tracking, healthcare, control/assistant, and security systems to real-world applications, including medical/human-care systems a
APA, Harvard, Vancouver, ISO, and other styles
22

Mao, Yuxin, and Ping Zhu. "A Source-Initiated On-Demand Routing Algorithm Based on the Thorup-Zwick Theory for Mobile Wireless Sensor Networks." Scientific World Journal 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/283852.

Full text
Abstract:
The unreliability and dynamics of mobile wireless sensor networks make it hard to perform end-to-end communications. This paper presents a novel source-initiated on-demand routing mechanism for efficient data transmission in mobile wireless sensor networks. It explores the Thorup-Zwick theory to achieve source-initiated on-demand routing with time efficiency. It is able to find out shortest routing path between source and target in a network and transfer data in linear time. The algorithm is easy to be implemented and performed in resource-constrained mobile wireless sensor networks. We also e
APA, Harvard, Vancouver, ISO, and other styles
23

Agrawal, Reeya. "Comparison of Different Mobile Wireless Technology (From 0G to 6G)." ECS Transactions 107, no. 1 (2022): 4799–839. http://dx.doi.org/10.1149/10701.4799ecst.

Full text
Abstract:
Networks and the value they provide. Mobile wireless technology has evolved from Zero Generation (0G) through the first, second, and third-generation systems during the last several decades to increase Quality of Service (QoS), efficiency, and performance. There is now a shift to implementing fourth-generation (4G) systems. Shortly, mobile devices will have access to 4G and 5G networks. 1G technology made mass mobile wireless communication possible. Since analog technology was superseded by digital in the 1990s, two-generation (2G) wireless communication has evolved tremendously. New converged
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Qiangyi, and Ningzhong Liu. "Monitoring Area Coverage Based on Control Multimedia Nodes Position in Mixed Underwater Mobile Wireless Sensor Networks." Advances in Multimedia 2022 (September 28, 2022): 1–10. http://dx.doi.org/10.1155/2022/5888728.

Full text
Abstract:
Due to the high cost of mobile nodes and the low cost of fixed nodes, in some applications of wireless sensor networks, in order to reduce the use cost, the mixed mode is used for node deployment. The deployed nodes include both fixed and mobile nodes. After the nodes are deployed, the fixed nodes do not move, and the mobile nodes move reasonably according to the network coverage to improve the network coverage effect. Due to the differences in equipment structure and use cost between fixed nodes and mobile nodes, in order to complete the monitoring task under the condition of reducing the use
APA, Harvard, Vancouver, ISO, and other styles
25

Babić, Neda, Branka Mikavica, Mirjana Stojanović, and Aleksandra Kostić-Ljubisavljević. "Wireless Powered Mobile edge Computing networks." Tehnika 80, no. 2 (2025): 185–91. https://doi.org/10.5937/tehnika2502185b.

Full text
Abstract:
The integration of Wireless Power Transfer (WPT) and Mobile Edge Computing (MEC) has enabled the development of Wireless Powered Mobile Edge Computing (WPMEC) networks, which are considered crucial for the sustainability of Industrial Internet of Things (IIoT) systems. The primary objective of WPMEC is to enhance the computational capabilities of mobile devices while compensating for their battery limitations. A WPMEC system consists of energy transmitters, mobile devices, and edge servers, forming a closed-loop structure. Due to network dynamics, limited battery life, and the half-duplex oper
APA, Harvard, Vancouver, ISO, and other styles
26

Rusan, Andrei, and Radu Vasiu. "IP Impairment Testing for Wireless Mobile Networks." Balkan Region Conference on Engineering and Business Education 2, no. 1 (2017): 284–91. http://dx.doi.org/10.1515/cplbu-2017-0037.

Full text
Abstract:
Abstract Wireless mobile telecommunications are of growing importance and an enabler for the Internet of Things. Most networks are IP based or moving to an IP based infrastructure, including the latest 4G LTE and the future 5G networks. Understanding and being able to predict the behavior and performance of such networks in various scenarios and conditions is critical. This drives the need to study IP impairments in wireless telecommunications networks and to assess their impact on network and service performance. One method is to emulate/generate IP impairments while observing and measuring t
APA, Harvard, Vancouver, ISO, and other styles
27

Gupta, Parul. "Comparative Study of Fault Detection Techniques in Wireless Networks and Manets." International Journal of Advanced Multidisciplinary Research and Studies 3, no. 2 (2023): 1207–13. https://doi.org/10.62225/2583049x.2023.3.2.4114.

Full text
Abstract:
The internet has dominated global communication for over three decades, largely due to the robustness and ease of deployment offered by wired networks. However, in recent years, the decreasing hardware costs associated with wireless networks have significantly boosted their popularity worldwide. Traditional wireless networks typically require a central device, such as a router (acting as a server), to which multiple devices (clients) connect wirelessly. In contrast, Mobile Ad-Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) operate without such centralized devices. MANETs are decentra
APA, Harvard, Vancouver, ISO, and other styles
28

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-config
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Chongdeuk. "HCCA for Wireless Mobile Coverage Networks." Indian Journal of Science and Technology 9, no. 1 (2016): 1–8. http://dx.doi.org/10.17485/ijst/2016/v9i46/107198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tripathi, A. K., and S. K. Nair. "Mobile Advertising in Capacitated Wireless Networks." IEEE Transactions on Knowledge and Data Engineering 18, no. 9 (2006): 1284–96. http://dx.doi.org/10.1109/tkde.2006.144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Spragins, J. "Mobile and Wireless Networks [New Books]." IEEE Network 10, no. 6 (1996): 3. http://dx.doi.org/10.1109/mnet.1996.546347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Guo, Zhongwen, Minglu Li, Yu Wang, Lei Chen, and Feng Hong. "Sensing with Mobile Wireless Sensor Networks." International Journal of Distributed Sensor Networks 10, no. 12 (2014): 936830. http://dx.doi.org/10.1155/2014/936830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Xiang-Yang, and Peng-Jun Wan. "Constructing minimum energy mobile wireless networks." ACM SIGMOBILE Mobile Computing and Communications Review 5, no. 4 (2001): 55–67. http://dx.doi.org/10.1145/509506.509518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Caimu Tang and D. O. Wu. "Mobile Privacy in Wireless Networks-Revisited." IEEE Transactions on Wireless Communications 7, no. 3 (2008): 1035–42. http://dx.doi.org/10.1109/twc.2008.060802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Akbari Torkestani, Javad. "Mobility prediction in mobile wireless networks." Journal of Network and Computer Applications 35, no. 5 (2012): 1633–45. http://dx.doi.org/10.1016/j.jnca.2012.03.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Fang, Dongfeng, Yi Qian, and Rose Qingyang Hu. "Security for 5G Mobile Wireless Networks." IEEE Access 6 (2018): 4850–74. http://dx.doi.org/10.1109/access.2017.2779146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Silva, Ricardo, Jorge Sá, N. A. Silva, N. A. Joã, o. Manuel L. P. Caldeira, and Joel J. P. C. Rodrigues. "Mobile multimedia in wireless sensor networks." International Journal of Sensor Networks 11, no. 1 (2012): 3. http://dx.doi.org/10.1504/ijsnet.2012.045035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, C. R., and M. Gerla. "Adaptive clustering for mobile wireless networks." IEEE Journal on Selected Areas in Communications 15, no. 7 (1997): 1265–75. http://dx.doi.org/10.1109/49.622910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mahjri, Imen, Samir Medjiah, Amine Dhraief, Khalil Drira, and Abdelfettah Belghith. "Weighted localization in mobile wireless networks." Internet Technology Letters 1, no. 1 (2017): e12. http://dx.doi.org/10.1002/itl2.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ma, Shi Qiang, and Xiao Gang Qi. "An Adaptive Location Updates and Propagation Scheme for Mobile Sinks." Applied Mechanics and Materials 44-47 (December 2010): 772–76. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.772.

Full text
Abstract:
Mobile sink can be used to balance energy consumption of sensor nodes in Wireless Sensor Networks (WSNs). Sink is required to inform sensors about its new location information whenever necessary. However, frequent location updates of mobile sink can lead to both rapid energy consumption of sensor nodes and increased collisions in wireless transmissions. We propose ALUPS (A New Solution with Adaptive Location Update and Propagation Scheme) for mobile sinks to resolve this problem. When a sink moves, it only needs to broadcast its location information within a local adaptive area other than amon
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Tzung-Shi, Jen-Jee Chen, Xiang-You Gao, and Tzung-Cheng Chen. "Mobile Charging Strategy for Wireless Rechargeable Sensor Networks." Sensors 22, no. 1 (2022): 359. http://dx.doi.org/10.3390/s22010359.

Full text
Abstract:
In a wireless sensor network, the sensing and data transmission for sensors will cause energy depletion, which will lead to the inability to complete the tasks. To solve this problem, wireless rechargeable sensor networks (WRSNs) have been developed to extend the lifetime of the entire network. In WRSNs, a mobile charging robot (MR) is responsible for wireless charging each sensor battery and collecting sensory data from the sensor simultaneously. Thereby, MR needs to traverse along a designed path for all sensors in the WRSNs. In this paper, dual-side charging strategies are proposed for MR t
APA, Harvard, Vancouver, ISO, and other styles
42

Chandra, Pankaj, and Santosh Soni. "A NEW APPROACH TO WIRELESS CHARGING AND ON-DEMAND DATA GATHERING (SSWCODDG) FOR RWSN." Suranaree Journal of Science and Technology 31, no. 2 (2024): 010300(1–10). http://dx.doi.org/10.55766/sujst-2024-02-e03129.

Full text
Abstract:
These days, WSNs (wireless sensor networks) are all about collecting data and reducing energy use. Mobile sinks and chargers can visit Cluster Heads (CHs) to gather data and recharge their batteries, respectively. A mobile VAN (MV) combines a mobile charger and sinks to improve the energy efficiency of a WSN. Determining the CHs’ guest instructions for wireless data collecting and charging is difficult. In response to these problems, the authors of this study present SSWCODDG (Santosh Soni Wireless Charging and on Demand Data Gathering), a new approach to wirelessly charging and data collectio
APA, Harvard, Vancouver, ISO, and other styles
43

Yu, Qin, Jin Lei Fan, and Yu Ming Mao. "Traffic Differentiation-Based Network Selection Scheme in Wireless Heterogeneous Networks." Applied Mechanics and Materials 198-199 (September 2012): 1804–9. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1804.

Full text
Abstract:
The emergence of wireless packet-switched networks such as Universal Mobile Telecommunications System (UMTS), and wireless local area networks (WLANs) can provide voice, data, and video services for users. In this paper, we propose a network selection scheme in the wireless heterogeneous networks based on the traffic differentiation, conversational class, interactive class, streaming class, and background class. Simulation results demonstrate that the proposed network scheme can decide the optimal network to handoff according to the traffic class.
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Mingfu. "Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks." Scientific World Journal 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/215710.

Full text
Abstract:
Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed
APA, Harvard, Vancouver, ISO, and other styles
45

Tusher, Chandra Ghosh, and Ismail Jabiullah Md. "Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks." Recent Trends in Information Technology and its Application 4, no. 3 (2021): 1–11. https://doi.org/10.5281/zenodo.5573669.

Full text
Abstract:
We are going to enter the world of the 5G network. There are many advanced features in the 5G network. The newer features come, the more security will be required, for all these new features. This paper is a survey for 5 generations of wireless network security, complete and thorough our current cellular network. This paper starts with a rethink of 5G wireless networks circumstantial as well as on the new pretension and motivations of 5G wireless security. The effective offensive and security services with the thought of new service necessity and latest use-cases in 5G Wireless Network securit
APA, Harvard, Vancouver, ISO, and other styles
46

Emara, Tamer Z. "Maximizing Power Saving for VoIP over WiMAX Systems." International Journal of Mobile Computing and Multimedia Communications 7, no. 1 (2016): 32–40. http://dx.doi.org/10.4018/ijmcmc.2016010103.

Full text
Abstract:
The voice-over-Internet protocol (VoIP) service is expected to be widely supported in wireless mobile networks. Mobile Broadband Wireless networks VoIP service to users with high mobility requirements, connecting via portable devices which rely on the use of batteries by necessity. Energy consumption significantly affects mobile subscriber stations in wireless broadband access networks. Efficient energy saving is an important and challenging issue because all mobile stations are powered by limited battery lifetimes. Therefore, the authors propose an adaptive mechanism suitable for VoIP service
APA, Harvard, Vancouver, ISO, and other styles
47

Rehan, Jamil Irfan Jamil Muhammad Ismail Naveed Ur Rehman. "Case Study of Wireless Networking for Small Business." International Journal of Engineering Works 1, no. 1 (2015): 20–15. https://doi.org/10.5281/zenodo.15745.

Full text
Abstract:
Mobile and wireless networks have undergone rapid changes and have seen an unprecedented growth during the last few years. Traditional ways of networking have changed to accommodate new lifestyles and newer ways of working. Wireless networks offer several advantages over fixed or wired networks through mobility, flexibility, ease of access, speed of deployment, and low cost. Flexibility of wireless networks facilitates rapid deployment. Finally, this paper identifies the benefits of wireless technology for small businesses and features of wireless networks
APA, Harvard, Vancouver, ISO, and other styles
48

Zhou, Xin Lian, Bin Xiao, and Jing Liang Cheng. "Mobile Wireless Sensor Networks K-Covering Algorithm." Advanced Materials Research 216 (March 2011): 617–20. http://dx.doi.org/10.4028/www.scientific.net/amr.216.617.

Full text
Abstract:
In mobile wireless sensor networks, sensor nodes may due to their own moves, energy loss, physical damage, errors and failures or other factors, will result the case of coverage holes, and then lead to inefficient network coverage. This paper designed a new algorithm based on clustering approach for mobile wireless sensor network, can monitor the network in real-time and repairing coverage holes quickly. Simulation results show that, the algorithm used in mobile wireless sensor network not only can achieve the desired uniformity of coverage, but also increase the coverage area, and better perf
APA, Harvard, Vancouver, ISO, and other styles
49

Thi Mai Lan, Nguyen. "Evolution of Wireless Technology: From 1G to 5G." Asian Journal of Applied Science and Technology 07, no. 04 (2023): 68–73. http://dx.doi.org/10.38177/ajast.2023.7408.

Full text
Abstract:
The discovery of mobile phone has changed people's live. Along with the advent of mobile phone devices, generations of wireless connection networks have developed like an unstoppable revolution. This article refers to the comparative analysis of wireless technology network generations from generation 1 (1G) to generation 5 (5G). Each generation of mobile networks is briefly summarized in terms of development history, technical specifications as well as technology standards, speed and frequency data, thereby demonstrating the development of public mobile networks. technology and its development
APA, Harvard, Vancouver, ISO, and other styles
50

K., Thamizhmaran. "Wireless Networks using Scheduling Techniques in Wireless MANET." Advancement and Research in Instrumentation Engineering 7, no. 3 (2024): 98–106. https://doi.org/10.5281/zenodo.14233852.

Full text
Abstract:
<em>Mobile ad hoc networks are multi-hop wireless networks that are self-organizing and self-configuring, with a dynamically changing network structure. The primary cause of this is the nodes' mobility. Ad-hoc networking is becoming more and more significant due to the proliferation of portable devices and advancements in wireless communication, as well as the growing number of widely used applications. MANET has a wide range of applications, from tiny, static networks with power source constraints to large-scale, mobile, extremely dynamic networks. This study employs a Scheduling Algorithm to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!