default search action
Ad Hoc & Sensor Wireless Networks, Volume 51
Volume 51, Numbers 1-3, 2022
- Chunmao Jiang, Yue Liu:
Energy-saving Offloading Strategies for Sensor Tasks Based on Three-way Game Theory in Wireless Communications. 1-22 - N. Srinivas Rao, K. V. S. N. Rama Rao:
An Energy-Efficient Routing Scheme in Wireless Sensor Networks for Life Time Maximization Using Fuzzy Based Decision. 23-39 - Zhifang Wang, Jianguo Yu, Kun Bi, Shangjing Lin, Zheng Yu:
Research on Long-distance Transmission of Nodes in Amorphous Flat Air-to-ground Wireless Ad-Hoc Network Based on Bidirectional Relay Beamforming. 41-59 - Xin-Lei Liu, Qiang Wu, Bin Shen, Hong-Quan Zhang, Hong-Liang Wang, Sheng-Wu Cao:
Research of Oriented Ceramic Nanotube Array Full Range Methane Sensors Based on MEMS Technology Used for Wireless Monitoring Networks. 61-74 - Li Qian, Yongyi Fang, Baoan Liu, Shi Shanzhe:
Optimization of Wireless Transmission of Distributed Cable Tunnel Data Based on Mobile Edge Computing and Wireless Sensor Networks. 75-89 - Chaitanya Duggineni:
Performance Analysis of Cooperative Sensing Based on Reputation Values. 91-111 - Krishnadas J., P. Manimegalai, G. K. D. Prasanna Venkatesan:
A Detailed Survey on Swarm Intelligence Algorithms for Efficient Optimal Path Selection in WSN for Effective Online Business Platform. 113-140 - Mohsen Othmani, Tahar Ezzedine, Qing-Guo Wang:
Event Detection in Clustered Wireless Sensor Networks Using Dynamic Cell Structures Neural Networks. 141-171 - Mohammad Javad Khani, Zahra Shirmohammadi:
SRCM: An Efficient Method for Energy Consumption Reduction in Wireless Body Area Networks based on Data Similarity. 173-187 - Angeline Rachel Sharon, N. Victor Jaya:
Efficient Cluster Head Selection and Fault Tolerant Routing Method for Mobile Wireless Sensor Networks. 189-204 - V. N. Senthil Kumaran, G. Ananthi:
Artificial Noise Aided Polar Code with Optimal Jamming Position for Physical Layer Security in Mondrian Loss Integrated Rayleigh Wireless Relay Channel. 205-234
Volume 51, Number 4, 2022
- Neda Mehdizadeh, Nazbanoo Farzaneh:
An Evidence Theory based Approach in Detecting Malicious Controller in the Multi-Controller Software-defined Internet of Things Network. 235-260 - Yuhan Jing, Lei Zhang, Cong Liu, Jing Wang, Wei Li, Bo He, Qi Qi, Jingyu Wang:
Causality Graph Construction of Fault Alarms for Wireless Sensor Networks. 261-284 - Farhana Afroz, Robin Braun, Zenon Chaczko:
XX-MAC and EX-MAC: Two Variants of X-MAC Protocol for Low Power Wireless Sensor Networks. 285-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.