|
|
|
Jin Li, Tao Han, Wenyang Guan and Xiaoqin Lian
With the development and popularization of Intelligent Transportation Systems (ITS), Vehicle Ad-Hoc Networks (VANETs) have attracted extensive attention as a key technology. In order to achieve real-time monitoring, VANET technology enables vehicles to c...
ver más
|
|
|
|
|
|
|
A. F. M. Shahen Shah
Unmanned aerial vehicles (UAVs) are valued in 5G and 6G networks due to their communication capabilities, low cost, and flexible deployment. Recently, UAV-aided emergency networks in disasters have been designed where one single large UAV is used. Compar...
ver más
|
|
|
|
|
|
|
Zhenyi Wang, Shengyun Wei, Li Zou, Feifan Liao, Weimin Lang and Yuanzhuo Li
The most widely used Wi-Fi wireless communication system, which is based on OFDM, is currently developing quickly. The receiver must, however, accurately estimate the carrier frequency offset between the transmitter and the receiver due to the characteri...
ver más
|
|
|
|
|
|
|
Qian Yang, Suoping Li, Hongli Li and Weiru Chen
To accurately estimate the service delay behavior of IEEE 802.11 networks, this paper comprehensively considers four main factors that affect the performance of IEEE 802.11 networks and establishes a service delay model with statistical characteristics. ...
ver más
|
|
|
|
|
|
|
Zaher Salah and Esraa Abu Elsoud
The rise in internet users has brought with it the impending threat of cybercrime as the Internet of Things (IoT) increases and the introduction of 5G technologies continues to transform our digital world. It is now essential to protect communication net...
ver más
|
|
|
|
|
|
|
Woo-Yong Choi
Since low-power Wi-Fi sensors are connected to the Internet, effective radio spectrum use is crucial for developing an efficient Medium Access Control (MAC) protocol for Wi-Fi sensor networks. A connectivity-based multipolling mechanism was employed for ...
ver más
|
|
|
|
|
|
|
Giuseppe Granato, Alessio Martino, Andrea Baiocchi and Antonello Rizzi
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated tools relying on a large number of features. Mathematical modeling is extremely difficult, given the ample variety of traffic patterns and the subtle and vari...
ver más
|
|
|
|
|
|
|
Kirill Chemrov, Dmitry Bankov, Evgeny Khorov and Andrey Lyakhov
Real-time applications (RTA) are an important use case for IEEE 802.11be, a new amendment to the Wi-Fi standard. This amendment introduces new complicated mechanisms to provide low delay and high reliability for RTA, but many of them are not supported by...
ver más
|
|
|
|
|
|
|
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto
Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. Howe...
ver más
|
|
|
|
|
|
|
Yinhuan Dong, Duanxu Shi, Tughrul Arslan and Yunjie Yang
Researchers have explored multiple Wi-Fi features to estimate user locations in indoor environments in the past decade, such as Received Signal Strength Indication (RSSI), Channel State Information (CSI), Time of Arrival (TOA), and Angle of Arrive (AoA)....
ver más
|
|
|
|