wireless sensor network sensor networks manet ubiquitous computing wireless sensor networks wsn ad hoc computing graph theory energy aodv clustering mac ad hoc networks energy consumption routing energy conservation security throughput vr/ar streaming adhoc and sensor networks high speed networks connectivity network lifetime. manets end-to-end delay data management issues internet and web applications addressing and location management internet of things ad hoc networks of autonomous intelligent systems architectures wireless ad hoc networks wireless internet of things (iot) bluetooth lora sensor packet error preemptive dsr collision cognitive agents heterogeneous wireless networks qos routing protocols sensor network visible light communication mobile ad-hoc networks authentication redundant mobile robot 6lowpan relocation energy efficient routing protocols routing overhead protocol thin client chirp spread spectrum network architectures network security coverage css lpwan cloud computing intelligent community system virtualization routing factor opportunistic network access control design guidelines interaction techniques gestures. organic user interface tangible interfaces python database rfid bs. routing protocol aca scp broadcasting bluetooth low energy srp quality of service smt energy-efficiency sleep aodv load balance hop visible impaired person white-cane biometric security algorithms infrared sensor energy efficiency experiments compromised nodes ibeacons gps mobile adhoc network’s healthcare free space optics wireless communication rsu model driven architecture embedded sensors domain specific language mobile development android vanet wimax inverted-f antenna time of arrival (toa) angle of arrival (aoa) non-line-of-sight (nlos) adhoc networks gpsr protocol secured gpsr network lifetime sinkhole attack distance learning automata packet scheduling network disconnection. transaction recovery transaction log flash memory mobile transactions network trust mobile & broadband wireless internet network protocols & wireless networks squashing function bayesian estimator soft computing genetic algorithm fuzzy logic neural nets mobile networks & wireless lan networks blockchain distributed extensions of centralized graph theore connectivity analysis under different mobility mod shadowing link distance probability delivery ratio mac layer wlan wi-fi gbdeer protocol drqos rate control multipath routing big data / cloud computing and networks cooperation communication work models signal processing origin destination matrix cctv mobile phone technology sensor node applications distributed file system. mobile network packet delivery ratio v2v deployment knowledge resource allocation security and privacy communications computer networks v2i its machine learning context dynamic source routing (dsr) mimo cooperative ad hoc networks and on-demand routing protocols. dsdv bee colony algorithm ubiquitous mobile computing rule-based approach context-awareness multi-hop relay amplify-and-forward ieee 802.16j protocols and algorithms iot rpl wireless relay networks coap single copy routing scheme key management optimal power allocation social based routing delay tolerant networks computing grph massage mact massage zigbee ieee 802.16 cluster ad hoc network air pollution idsq beacon communication range range based location scheme location sensing mobile sink lossless compression pervasive system; smart space; resource mobility; and algorithms hyper-resolution-rule distributed constraint satisfaction problem arq bit error rate wireless channel adaptive fec gur game packet loss ratio. lifetime clusters multi-constrained routing multicasting asymmetrical sensor networks wireless sensor network (wsn); clustering; cluster secure channel. key agreement third party saved rebroadcast probabilistic routing reachability parameter broadcast storm isi sdr rrc ber hdtv fair and efficient trust establishment mobile ad hoc networks tcp variants maodv raodv computer zrp energy efficient routing multimedia networking dynamic path switching encryption key wireless lan ssid shortest path algorithm network based applications wsns (wireless sensor networks) radio range. network operations & management measurement & performance analysis keyless entry system infrared ray communication wireless sensor network. coverage holes hole healing remote control obu hybrid routing protocols reactive routing protocols proactive routing protocols delay. nodes line of sight adaption t protocols connected dominating set secure routing protocol report fabrication attack cluster based wireless sensor network experimentation design fl oating-point data attacks counterattacks and wireless sensor network cross layer information tcp dsr congestion control ieee mac 802.11 transmission power. signal-to-interference-plus-noise power ration vanets ad-hoc networks secure routing algorithms and protocols based on g evacuation routing algorithms and protocols for ve algorithms for topology control and power assignme algorithms for scheduling and resource allocation approximation heuristics for np-complete problems data gathering algorithms and protocols for sensor applications of random graph theory in ad hoc netw pdf power nodes power control adult education literacy classroom acts learning environments human-computer-interaction. vehicle-to-everything (v2x) and autonomous cars natural logic natural vs. artificial intelligence semantics-driven language processing. distributed computing architectural structure design decisions and philosophies natural language processing- named entity recognit chunking recurrent neural networks transformer model opnet simulation pcf rts/cts jamming attack unified security mechanism data and knowledge representation cyber-physical system (cps) visualization of sensor data wireless & mobile network security exor etx wireless networks life time big data techniques models and algorithms big data infrastructure and platform big data mining wsn is formed by autonomous nodes with partial mem communication range power and bandwidth. their occupation depends on inspect comprising military ecology home or commercial and require a highly secured co  distributed extensions of centralized graph theo  connectivity analysis under different mobility m  data gathering algorithms and protocols for sens storage space key usage elliptic curve cryptography. coverage.  big data / cloud computing and networks next generation internet mobile devices thin clients remote display information / content centric networks (icn) services and applications low power design communication versus computation energy consumptio real-time data delivery. arbitrary directed graph unidirectional ring kinesthetic learning activity kla cs education artificial immune systems cryptography and coding data integrity fuzzy systems information hiding security management quantum cryptography security engineering trust management software security sensors recent computing adhoc ubiqitious line of sigh ai in network scientific computing computation models compiler hardware and os issues education in computational sci problem solving quantum computing distributed technology mobile computing artificial intelligence baseband modulation frequency ch ch selection heterogeneous wsn mobile ad hoc learning atmospheric aggressiveness time of wetness corrosion humid tropical climate electronic commerce grid security secure cloud computing broadband access networks boundary control devices communication network protocols communication network architectures and design deployments and implementations vlsi design communication systems image processing security and privacy for iot iot applications and services real time routing routing messages network routing scheduling context aware image fusion discrete wavelet transform (dwt) agent military sensor networks (msn). anda lid energy factor leach lead efficiency dissipation ad hoc network protocols reactive routing flooding mobility. vehicular ad hoc networks push-pull concept opportunistic networks w-man intermittent connectivity performance pervasive computing participatory sensing confidence privacy control data confidentiality integrity packet loss knowledge base management reputation data communication mobile data aggregation and data gathering compressive data gathering covert channel subliminal channel hybrid covert channel trapdoors trust. identity management access management digital identity idm taxonomies identity management survey tora end to end delay throughput. fingerprint encryption decryption minutiae point daylight substitution. stochastic deployments statistical analysis analytical hierarchy process aggregation police patrols wireless sensor networks (wsn) mobile ad hoc networks (manet) vehicular ad hoc networks (vanet) vehicular ad hoc and sensor network (vasnet) data fusion localization routing. battery power lifetime of wireless sensor network minimum energy cost routing optimal flow linear programming problem. mobility models olsr vbr cbr  advanced it bio/ medical engineering  cloud computing digital convergence adaption tree wireless body area network body sensor network wban survey. signal-to-interference-plus-noise power ration (si and transmission power. data gathering power aware remote monitoring fabrication target coverage problem greedy heuristic mobile ad-hoc network on-demand routing protocols mobility medium acess control latency. ad hoc tree structure clock synchronization hierarchical sensor network. cbc mild mimd aetf contention window fairness delay vehicular ad hoc network message propagation free flow congested flow game theory asynchronous distributed pricing distributed resource allocation location privacy secure routing context summarization
See more