Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Xuening Liao"'
Publikováno v:
Frontiers in Energy Research, Vol 10 (2023)
As an important branch of the Internet of Things, the smart grid has become a crucial field of modern information technology. It realizes the two-way information flow and power flow by integrating the advanced metering infrastructure (AMI) and distri
Externí odkaz:
https://doaj.org/article/701b82e80c0f4ebcb570b15f46b99320
Publikováno v:
Sensors, Vol 23, Iss 10, p 4822 (2023)
This paper investigates the problem of buffer-aided relay selection to achieve reliable and secure communications in a two-hop amplify-and-forward (AF) network with an eavesdropper. Due to the fading of wireless signals and the broadcast nature of wi
Externí odkaz:
https://doaj.org/article/bbe31645755d493d94e67fa6a91fc823
Publikováno v:
IEEE Access, Vol 8, Pp 66411-66422 (2020)
Developments in wireless communications and wearable devices have facilitated the emergence of a network of tiny sensors embedded in, on or around human body called Wireless Body Area Network (WBAN). Over the last decade, WBAN has increasingly been p
Externí odkaz:
https://doaj.org/article/a41d5ffbc3df42e6a34244c7ebda0107
Publikováno v:
IEEE Transactions on Computational Social Systems. :1-9
Publikováno v:
2022 International Conference on Networking and Network Applications (NaNA).
Publikováno v:
2022 International Conference on Networking and Network Applications (NaNA).
Publikováno v:
Journal of Networking and Network Applications. 1:49-59
Owing to its capability to measure the sensitive biological data of patients through embedded sensors and transmit them via open wireless channels to remote medical experts, wireless body area network (WBAN) has been playing an important role in perv
Publikováno v:
2021 International Conference on Networking and Network Applications (NaNA).
Publikováno v:
2021 International Conference on Networking and Network Applications (NaNA).
Publikováno v:
Wireless Networks. 26:3275-3289
Covert wireless communication ensures information security by hiding the existence of the information transmission itself. Available works mainly focused on the covert throughput study of one-hop wireless communications, while the performance limit o