Tags
wireless sensor network
sensor networks
manet
ubiquitous computing
wireless sensor networks
wsn
ad hoc computing
graph theory
energy
mac
aodv
clustering
energy consumption
security
routing
ad hoc networks
energy conservation
throughput
vr/ar streaming
end-to-end delay
manets
high speed networks
adhoc and sensor networks
connectivity
network lifetime.
data management issues
wireless ad hoc networks
wireless
internet of things (iot)
preemptive dsr
qos
sensor network
internet and web applications
heterogeneous wireless networks
collision
packet error
lora
internet of things
cognitive agents
sensor
visible light communication
bluetooth
addressing and location management
ad hoc networks of autonomous intelligent systems
architectures
routing protocols
biometric security
energy efficient routing protocols
mobile ad-hoc networks
routing overhead
protocol
infrared sensor
white-cane
visible impaired person
authentication
access control
python
database
rfid
bs.
aca
scp
smt
srp
compromised nodes
algorithms
hop
load balance
network security
network architectures
6lowpan
chirp spread spectrum
css
lpwan
experiments
ibeacons
broadcasting
bluetooth low energy
mobile adhoc network’s
sleep aodv
opportunistic network
routing factor
redundant
mobile robot
relocation
cloud computing
intelligent community system
virtualization
thin client
coverage
energy efficiency
gps
design guidelines
interaction techniques
gestures.
organic user interface
tangible interfaces
routing protocol
quality of service
energy-efficiency
technology
computing
signal processing
protocols and algorithms
key management
applications
mobile network
communications
computer networks
machine learning
security and privacy
resource allocation
work models
big data / cloud computing and networks
multipath routing
rate control
drqos
gbdeer protocol
coap
rpl
iot
bee colony algorithm
multi-hop relay
ieee 802.16j
wireless relay networks
healthcare
squashing function
bayesian estimator
soft computing
genetic algorithm
fuzzy logic
neural nets
wlan
wi-fi
wimax
inverted-f antenna
adhoc networks
network lifetime
network disconnection.
transaction recovery
transaction log
flash memory
mobile transactions
network
trust
packet scheduling
learning automata
distance
sinkhole attack
secured gpsr
gpsr protocol
non-line-of-sight (nlos)
angle of arrival (aoa)
time of arrival (toa)
mac layer
delivery ratio
probability
link distance
shadowing
connectivity analysis under different mobility mod
distributed extensions of centralized graph theore
blockchain
networks
mobile networks & wireless lan
network protocols & wireless networks
mobile & broadband wireless internet
wireless communication
rsu
vanet
android
mobile development
domain specific language
embedded sensors
model driven architecture
free space optics
dsdv
ad hoc networks and on-demand routing protocols.
dynamic source routing (dsr)
context
ubiquitous mobile computing
rule-based approach
context-awareness
single copy routing scheme
social based routing
delay tolerant networks
distributed file system.
packet delivery ratio
deployment knowledge
its
v2i
v2v
mobile phone
cctv
origin destination matrix
sensor node
cooperation communication
optimal power allocation
amplify-and-forward
mimo cooperative
distributed technology
quantum computing
problem solving
education in computational sci
hardware and os issues
compiler
computation models
scientific computing
ai in network
line of sigh
ubiqitious
adhoc
recent computing
sensors
software security
trust management
security engineering
quantum cryptography
security management
information hiding
fuzzy systems
data integrity
cryptography and coding
artificial immune systems
cs education
kla
kinesthetic learning activity
unidirectional ring
arbitrary directed graph
scheduling
network routing
routing messages
real time routing
iot applications and services
security and privacy for iot
image processing
communication systems
vlsi design
deployments and implementations
communication network architectures and design
communication network protocols
boundary control devices
broadband access networks
secure cloud computing
grid security
electronic commerce
humid tropical climate
corrosion
time of wetness
atmospheric aggressiveness
mobile ad hoc learning
heterogeneous wsn
ch selection
ch
frequency
baseband modulation
artificial intelligence
mobile computing
wireless networks
etx
exor
wireless & mobile network security
visualization of sensor data
cyber-physical system (cps)
data and knowledge representation
unified security mechanism
jamming attack
rts/cts
pcf
opnet simulation
transformer model
recurrent neural networks
chunking
natural language processing- named entity recognit
design decisions and philosophies
architectural structure
distributed computing
semantics-driven language processing.
natural vs. artificial intelligence
natural logic
vehicle-to-everything (v2x) and autonomous cars
human-computer-interaction.
learning environments
classroom acts
literacy
adult education
power nodes power control
real-time data delivery.
communication versus computation energy consumptio
low power design
services and applications
information / content centric networks (icn)
remote display
thin clients
mobile devices
next generation internet
big data / cloud computing and networks
coverage.
elliptic curve cryptography.
key usage
storage space
data gathering algorithms and protocols for sens
connectivity analysis under different mobility m
distributed extensions of centralized graph theo
home or commercial and require a highly secured co
ecology
comprising military
and bandwidth. their occupation depends on inspect
power
communication range
wsn is formed by autonomous nodes with partial mem
big data mining
big data infrastructure and platform
models and algorithms
big data techniques
life time
power aware
data gathering
and transmission power.
signal-to-interference-plus-noise power ration (si
wban survey.
body sensor network
wireless body area network
adaption tree
digital convergence
cloud computing
advanced it bio/ medical engineering
cbr
vbr
olsr
mobility models
linear programming problem.
optimal flow
minimum energy cost routing
lifetime of wireless sensor network
battery power
routing.
localization
data fusion
vehicular ad hoc and sensor network (vasnet)
vehicular ad hoc networks (vanet)
mobile ad hoc networks (manet)
wireless sensor networks (wsn)
police patrols
aggregation
context summarization
secure routing
location privacy
distributed resource allocation
asynchronous distributed pricing
game theory
congested flow
free flow
message propagation
vehicular ad hoc network
delay
fairness
contention window
aetf
mimd
mild
cbc
hierarchical sensor network.
clock synchronization
ad hoc tree structure
latency.
medium acess control
mobility
on-demand routing protocols
mobile ad-hoc network
greedy heuristic
target coverage problem
fabrication
remote monitoring
integrity
data confidentiality
privacy control
confidence
participatory sensing
pervasive computing
performance
intermittent connectivity
w-man
opportunistic networks
push-pull concept
vehicular ad hoc networks
mobility.
flooding
reactive routing
network protocols
ad hoc
dissipation
efficiency
lead
leach
energy factor
lid
anda
military sensor networks (msn).
agent
discrete wavelet transform (dwt)
image fusion
context aware
analytical hierarchy process
statistical analysis
stochastic deployments
daylight substitution.
minutiae point
decryption
encryption
fingerprint
throughput.
end to end delay
tora
identity management survey
idm taxonomies
digital identity
access management
identity management
trust.
trapdoors
hybrid covert channel
subliminal channel
covert channel
compressive data gathering
data aggregation and data gathering
mobile
communication
data
reputation
knowledge base management
hyper-resolution-rule
distributed constraint satisfaction problem
arq
bit error rate
wireless channel
adaptive fec
packet loss ratio.
clusters
multi-constrained routing multicasting
saved rebroadcast
probabilistic routing
reachability parameter
broadcast storm
isi
sdr
rrc
ber
hdtv
fair and efficient
ieee 802.16
idsq
beacon communication range
range based location scheme
location sensing
mobile sink
ad hoc network
cluster
connected dominating set
secure routing protocol
report fabrication attack
cluster based wireless sensor network
experimentation
design
transmission power.
signal-to-interference-plus-noise power ration
secure routing algorithms and protocols based on g
evacuation routing algorithms and protocols for ve
algorithms for topology control and power assignme
algorithms for scheduling and resource allocation
approximation heuristics for np-complete problems
data gathering algorithms and protocols for sensor
applications of random graph theory in ad hoc netw
computer
multimedia networking
network based applications
network operations & management
measurement & performance analysis
remote control
obu
delay.
nodes
line of sight
adaption t
proactive routing protocols
reactive routing protocols
hybrid routing protocols
hole healing
coverage holes
wireless sensor network.
infrared ray communication
keyless entry system
radio range.
wsns (wireless sensor networks)
shortest path algorithm
ssid
wireless lan
encryption key
dynamic path switching
energy efficient routing
zrp
packet loss
pdf
ad-hoc networks
vanets
ieee mac 802.11
congestion control
dsr
tcp
cross layer information
counterattacks and wireless sensor network
attacks
fl oating-point data
lossless compression
pervasive system; smart space; resource mobility;
protocols
and algorithms
air pollution
zigbee
grph massage
mact massage
raodv
maodv
tcp variants
mobile ad hoc networks
trust establishment
third party
key agreement
secure channel.
wireless sensor network (wsn); clustering; cluster
asymmetrical sensor networks
lifetime
gur game
See more