239 Hits in 4.6 sec

Desynchronization with an artificial force field for wireless networks

Supasate Choochaisri, Kittipat Apicharttrisorn, Kittiporn Korprasertthaworn, Pongpakdi Taechalertpaisarn, Chalermek Intanagonwiwat
2012 Computer communication review  
Inspired by robotic circular formation, we propose DWARF (Desynchronization With an ARtificial Force field), a novel technique for desynchronization in wireless networks.  ...  We evaluate our implementation of DWARF on TOSSIM, a simulator for wireless sensor networks.  ...  The work inspires us to design a novel desynchronization protocol for wireless networks based on an artificial force field.  ... 
doi:10.1145/2185376.2185378 fatcat:wnr4f7baejggxdnr5u24qp55v4

Stable Desynchronization for Wireless Sensor Networks: (I) Concepts and Algorithms [article]

Supasate Choochaisri, Kittipat Apicharttrisorn, Chalermek Intanagonwiwat
2017 arXiv   pre-print
In this paper, we propose a novel desynchronization algorithm using artificial force field called Multi-hop Desynchronization With an ARtificial Force field or M-DWARF and use it to solve TDMA problems  ...  in wireless sensor networks (WSNs).  ...  In this paper, we propose a stable desynchronization algorithm for multi-hop wireless sensor networks called Multi-hop Desynchronization With an ARtificial Force field or M-DWARF.  ... 
arXiv:1704.07002v1 fatcat:7zxw65ewivgo7jrjbj3hx2i7l4

Applying Nature's Best Ideas to Biomimetics: Frog Calling

Leng Chuan Y Enamul Hoque M
2015 Journal of Applied Mechanical Engineering  
Nature inspired innovation has been progressively contributing to scientific advancements through applying natural concepts into design and manufacturing of artificial real-world appliances [1] .  ...  When these hexagonal toe pads get in contact with wet surface build capillary bridges, a strong adhesion force is formed [6, 7] .  ...  The bubbles form capillary bridges: stretched structures that exert an inward force on both ends, holding them together.  ... 
doi:10.4172/2168-9873.1000150 fatcat:muo2o7me5bdcrgbrh5prsxzfxy

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

Hichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai
2020 Sensors  
The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer.  ...  In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers.  ...  TCP desynchronization & TCP desynchronization is defined as a tentative to break the packet sequence by injection a packet with a wrong sequence number. & Authentication is required for all packets in  ... 
doi:10.3390/s20133625 pmid:32605178 pmcid:PMC7374330 fatcat:rk52vsqrrzd2hebt2xddhrdt54

Authentication in Wireless Sensor Networks

Dr. K. Nachimuthu
2018 International Journal for Research in Applied Science and Engineering Technology  
Wireless Sensor Networking (WSNs) is a developing field of research that presents analysts with testing objectives under tight outline imperatives.  ...  Wireless Sensor Networking (WSNs) is a region of incredible enthusiasm to both scholarly community and industry.  ...  A variation of this attack is when a self sacrificing node continuously asks for access to a channel, forcing its neighbors to respond with a Clear To Send (CTS) message. F.  ... 
doi:10.22214/ijraset.2018.7125 fatcat:7qla4a6if5fnniberhcipqiiey

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

CNN-LSTM Based Approach for Dos Attacks Detection in Wireless Sensor Networks

Salim Salmi, Lahcen Oughdir
2022 International Journal of Advanced Computer Science and Applications  
These attacks are often performed by a botnet, a network of malwareinfected computers controlled by an attacker.  ...  This research study uses a computer-generated wireless sensor network-detection system dataset.  ...  The technology is an ideal solution for numerous applications in various fields like telecommunication, military, healthcare, research, and agriculture, amongst others [1] . Aziz et al.  ... 
doi:10.14569/ijacsa.2022.0130497 fatcat:5ryiissgj5cvpkzmfccctusl5y

Security and privacy in 6G networks: new areas and new challenges

Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang, Shui Yu, Wanlei Zhou
2020 Digital Communications and Networks  
The blockchain technology and the quantum communication overlap with distributed artificial intelligence and intelligent radio.  ...  A B S T R A C T With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation  ...  Acknowledgments This work was supported by an ARC Linkage Project (LP180101150) from the Australian Research Council, Australia.  ... 
doi:10.1016/j.dcan.2020.07.003 fatcat:5rn6nc3c4rdopaj5jtqgqihkrq

From biomechanics to sport psychology: the current oscillatory approach

Guy Cheron
2015 Frontiers in Psychology  
FROM MUSCLE PATTERNS TO ARTIFICIAL DYNAMIC NEURAL NETWORK Since the key observations of Aristotle about locomotion and then the first mechanical model of this seeming simple movement proposed by Borelli  ...  Despite the accumulation of scientific data in the field of movement science and related psychology, this challenge has remained incompletely met.  ...  For example, prior to a self-paced movement an event related desynchronization (ERD) of the alpha-beta rhythm is recorded over the contralateral sensorimotor cortex followed by a bilateral alpha-beta ERD  ... 
doi:10.3389/fpsyg.2015.01642 pmid:26582999 pmcid:PMC4628124 fatcat:tjfwmushpzfepcp3jdmqqlodpe

Distributed Graph Coloring: An Approach Based on the Calling Behavior of Japanese Tree Frogs [article]

Hugo Hernández, Christian Blum
2010 arXiv   pre-print
As an example consider wireless ad-hoc and sensor networks, where tasks such as the assignment of frequencies or the assignment of TDMA slots are strongly related to graph coloring.  ...  In this paper we deal with the problem of finding valid colorings of graphs in a distributed way, that is, by means of an algorithm that only uses local information for deciding the color of the nodes.  ...  Several tasks in modern wireless ad-hoc networks, such as sensor networks, are related to graph coloring.  ... 
arXiv:1011.5349v1 fatcat:ydngiu3sprdizbal4ygugbja5a

Dissecting the Impact of Information and Communication Technologies on Digital Twins as a Service

Milan Groshev, Carlos Guimaraes, Antonio De La Oliva, Robert Gazda
2021 IEEE Access  
INDEX TERMS Digital Twin, Edge, NFV, 5G, distributed system, wireless networks.  ...  In this work, an Edge Robotics Digital Twin system is implemented as a prototype that embodies the concept of Digital Twin as a Service (DTaaS).  ...  He is also an accomplished engineering professional and a technologist with over 20 years of industry experience in wireless telecommunications, networking, and embedded systems.  ... 
doi:10.1109/access.2021.3098109 fatcat:bvqygtrrurfytg7ukb4mq7k2ii

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel.  ...  Passive RFID transponders are without an internal power source. Majority of RIFD transponders are passive. The RF field generated by the reader is a power supply for passive tag.  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

Wireless Sensor Network- Challenges and Possibilities

Amit Rathee, Randeep Singh, Abhishilpa Nandini
2016 International Journal of Computer Applications  
Wireless Sensor Network (WSN) is the current research field in computer science & has growing use in day to day life.  ...  As a new technology, it has several research challenges and vast opportunities for the researchers.  ...  Artificial Potential Fields-based Algorithms-these algorithms make use of mathematical concept called Artificial Potential Field (APF) of Virtual Forces (VF).  ... 
doi:10.5120/ijca2016909221 fatcat:bv7bgkhltvdqxax37qtcdcyyqu

Machine Learning for 5G/B5G Mobile and Wireless Communications: Potential, Limitations, and Future Directions

Manuel Eugenio Morocho-Cayamcela, Haeyoung Lee, Wansu Lim
2019 IEEE Access  
This paper focuses on the potential solutions for 5G from an ML-perspective.  ...  This article is intended to stimulate discussion on the role that ML can play to overcome the limitations for a wide deployment of autonomous 5G/B5G mobile and wireless communications.  ...  The nodes learn to synchronize when they have to cooperate for forwarding data, and learn to desynchronize in order to avoid intra-network radio interferences.  ... 
doi:10.1109/access.2019.2942390 fatcat:aeokq5rbubezzeb7gglksqxawi

Exploration of Various Attacks and Security Measures Related to the Internet of Things

2020 International journal of recent technology and engineering  
Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security.  ...  This work deals with the study of several attacks that are associated with the Internet of Things and also the approaches to secure the IoT systems.  ...  We would also like to thank other faculty members who guided us with more knowledge and insight in coming up with this successful work.  ... 
doi:10.35940/ijrte.b3353.079220 fatcat:cvnla5ix6zgydhtk266cxptbey
« Previous Showing results 1 — 15 out of 239 results