Tags
wireless sensor network
sensor networks
manet
ubiquitous computing
wireless sensor networks
wsn
ad hoc computing
graph theory
energy
aodv
clustering
mac
ad hoc networks
energy consumption
routing
energy conservation
security
throughput
vr/ar streaming
adhoc and sensor networks
high speed networks
connectivity
network lifetime.
manets
end-to-end delay
data management issues
internet and web applications
addressing and location management
internet of things
ad hoc networks of autonomous intelligent systems
architectures
wireless ad hoc networks
wireless
internet of things (iot)
bluetooth
lora
sensor
packet error
preemptive dsr
collision
cognitive agents
heterogeneous wireless networks
qos
routing protocols
sensor network
visible light communication
mobile ad-hoc networks
authentication
redundant
mobile robot
6lowpan
relocation
energy efficient routing protocols
routing overhead
protocol
thin client
chirp spread spectrum
network architectures
network security
coverage
css
lpwan
cloud computing
intelligent community system
virtualization
routing factor
opportunistic network
access control
design guidelines
interaction techniques
gestures.
organic user interface
tangible interfaces
python
database
rfid
bs.
routing protocol
aca
scp
broadcasting
bluetooth low energy
srp
quality of service
smt
energy-efficiency
sleep aodv
load balance
hop
visible impaired person
white-cane
biometric security
algorithms
infrared sensor
energy efficiency
experiments
compromised nodes
ibeacons
gps
mobile adhoc network’s
healthcare
free space optics
wireless communication
rsu
model driven architecture
embedded sensors
domain specific language
mobile development
android
vanet
wimax
inverted-f antenna
time of arrival (toa)
angle of arrival (aoa)
non-line-of-sight (nlos)
adhoc networks
gpsr protocol
secured gpsr
network lifetime
sinkhole attack
distance
learning automata
packet scheduling
network disconnection.
transaction recovery
transaction log
flash memory
mobile transactions
network
trust
mobile & broadband wireless internet
network protocols & wireless networks
squashing function
bayesian estimator
soft computing
genetic algorithm
fuzzy logic
neural nets
mobile networks & wireless lan
networks
blockchain
distributed extensions of centralized graph theore
connectivity analysis under different mobility mod
shadowing
link distance
probability
delivery ratio
mac layer
wlan
wi-fi
gbdeer protocol
drqos
rate control
multipath routing
big data / cloud computing and networks
cooperation communication
work models
signal processing
origin destination matrix
cctv
mobile phone
technology
sensor node
applications
distributed file system.
mobile network
packet delivery ratio
v2v
deployment knowledge
resource allocation
security and privacy
communications
computer networks
v2i
its
machine learning
context
dynamic source routing (dsr)
mimo cooperative
ad hoc networks and on-demand routing protocols.
dsdv
bee colony algorithm
ubiquitous mobile computing
rule-based approach
context-awareness
multi-hop relay
amplify-and-forward
ieee 802.16j
protocols and algorithms
iot
rpl
wireless relay networks
coap
single copy routing scheme
key management
optimal power allocation
social based routing
delay tolerant networks
computing
grph massage
mact massage
zigbee
ieee 802.16
cluster
ad hoc network
air pollution
idsq
beacon communication range
range based location scheme
location sensing
mobile sink
lossless compression
pervasive system; smart space; resource mobility;
and algorithms
hyper-resolution-rule
distributed constraint satisfaction problem
arq
bit error rate
wireless channel
adaptive fec
gur game
packet loss ratio.
lifetime
clusters
multi-constrained routing multicasting
asymmetrical sensor networks
wireless sensor network (wsn); clustering; cluster
secure channel.
key agreement
third party
saved rebroadcast
probabilistic routing
reachability parameter
broadcast storm
isi
sdr
rrc
ber
hdtv
fair and efficient
trust establishment
mobile ad hoc networks
tcp variants
maodv
raodv
computer
zrp
energy efficient routing
multimedia networking
dynamic path switching
encryption key
wireless lan
ssid
shortest path algorithm
network based applications
wsns (wireless sensor networks)
radio range.
network operations & management
measurement & performance analysis
keyless entry system
infrared ray communication
wireless sensor network.
coverage holes
hole healing
remote control
obu
hybrid routing protocols
reactive routing protocols
proactive routing protocols
delay.
nodes
line of sight
adaption t
protocols
connected dominating set
secure routing protocol
report fabrication attack
cluster based wireless sensor network
experimentation
design
fl oating-point data
attacks
counterattacks and wireless sensor network
cross layer information
tcp
dsr
congestion control
ieee mac 802.11
transmission power.
signal-to-interference-plus-noise power ration
vanets
ad-hoc networks
secure routing algorithms and protocols based on g
evacuation routing algorithms and protocols for ve
algorithms for topology control and power assignme
algorithms for scheduling and resource allocation
approximation heuristics for np-complete problems
data gathering algorithms and protocols for sensor
applications of random graph theory in ad hoc netw
pdf
power nodes power control
adult education
literacy
classroom acts
learning environments
human-computer-interaction.
vehicle-to-everything (v2x) and autonomous cars
natural logic
natural vs. artificial intelligence
semantics-driven language processing.
distributed computing
architectural structure
design decisions and philosophies
natural language processing- named entity recognit
chunking
recurrent neural networks
transformer model
opnet simulation
pcf
rts/cts
jamming attack
unified security mechanism
data and knowledge representation
cyber-physical system (cps)
visualization of sensor data
wireless & mobile network security
exor
etx
wireless networks
life time
big data techniques
models and algorithms
big data infrastructure and platform
big data mining
wsn is formed by autonomous nodes with partial mem
communication range
power
and bandwidth. their occupation depends on inspect
comprising military
ecology
home or commercial and require a highly secured co
distributed extensions of centralized graph theo
connectivity analysis under different mobility m
data gathering algorithms and protocols for sens
storage space
key usage
elliptic curve cryptography.
coverage.
big data / cloud computing and networks
next generation internet
mobile devices
thin clients
remote display
information / content centric networks (icn)
services and applications
low power design
communication versus computation energy consumptio
real-time data delivery.
arbitrary directed graph
unidirectional ring
kinesthetic learning activity
kla
cs education
artificial immune systems
cryptography and coding
data integrity
fuzzy systems
information hiding
security management
quantum cryptography
security engineering
trust management
software security
sensors
recent computing
adhoc
ubiqitious
line of sigh
ai in network
scientific computing
computation models
compiler
hardware and os issues
education in computational sci
problem solving
quantum computing
distributed technology
mobile computing
artificial intelligence
baseband modulation
frequency
ch
ch selection
heterogeneous wsn
mobile ad hoc learning
atmospheric aggressiveness
time of wetness
corrosion
humid tropical climate
electronic commerce
grid security
secure cloud computing
broadband access networks
boundary control devices
communication network protocols
communication network architectures and design
deployments and implementations
vlsi design
communication systems
image processing
security and privacy for iot
iot applications and services
real time routing
routing messages
network routing
scheduling
context aware
image fusion
discrete wavelet transform (dwt)
agent
military sensor networks (msn).
anda
lid
energy factor
leach
lead
efficiency
dissipation
ad hoc
network protocols
reactive routing
flooding
mobility.
vehicular ad hoc networks
push-pull concept
opportunistic networks
w-man
intermittent connectivity
performance
pervasive computing
participatory sensing
confidence
privacy control
data confidentiality
integrity
packet loss
knowledge base management
reputation
data
communication
mobile
data aggregation and data gathering
compressive data gathering
covert channel
subliminal channel
hybrid covert channel
trapdoors
trust.
identity management
access management
digital identity
idm taxonomies
identity management survey
tora
end to end delay
throughput.
fingerprint
encryption
decryption
minutiae point
daylight substitution.
stochastic deployments
statistical analysis
analytical hierarchy process
aggregation
police patrols
wireless sensor networks (wsn)
mobile ad hoc networks (manet)
vehicular ad hoc networks (vanet)
vehicular ad hoc and sensor network (vasnet)
data fusion
localization
routing.
battery power
lifetime of wireless sensor network
minimum energy cost routing
optimal flow
linear programming problem.
mobility models
olsr
vbr
cbr
advanced it bio/ medical engineering
cloud computing
digital convergence
adaption tree
wireless body area network
body sensor network
wban survey.
signal-to-interference-plus-noise power ration (si
and transmission power.
data gathering
power aware
remote monitoring
fabrication
target coverage problem
greedy heuristic
mobile ad-hoc network
on-demand routing protocols
mobility
medium acess control
latency.
ad hoc tree structure
clock synchronization
hierarchical sensor network.
cbc
mild
mimd
aetf
contention window
fairness
delay
vehicular ad hoc network
message propagation
free flow
congested flow
game theory
asynchronous distributed pricing
distributed resource allocation
location privacy
secure routing
context summarization
See more
Presentations
(2)Documents
(241)Tags
wireless sensor network
sensor networks
manet
ubiquitous computing
wireless sensor networks
wsn
ad hoc computing
graph theory
energy
aodv
clustering
mac
ad hoc networks
energy consumption
routing
energy conservation
security
throughput
vr/ar streaming
adhoc and sensor networks
high speed networks
connectivity
network lifetime.
manets
end-to-end delay
data management issues
internet and web applications
addressing and location management
internet of things
ad hoc networks of autonomous intelligent systems
architectures
wireless ad hoc networks
wireless
internet of things (iot)
bluetooth
lora
sensor
packet error
preemptive dsr
collision
cognitive agents
heterogeneous wireless networks
qos
routing protocols
sensor network
visible light communication
mobile ad-hoc networks
authentication
redundant
mobile robot
6lowpan
relocation
energy efficient routing protocols
routing overhead
protocol
thin client
chirp spread spectrum
network architectures
network security
coverage
css
lpwan
cloud computing
intelligent community system
virtualization
routing factor
opportunistic network
access control
design guidelines
interaction techniques
gestures.
organic user interface
tangible interfaces
python
database
rfid
bs.
routing protocol
aca
scp
broadcasting
bluetooth low energy
srp
quality of service
smt
energy-efficiency
sleep aodv
load balance
hop
visible impaired person
white-cane
biometric security
algorithms
infrared sensor
energy efficiency
experiments
compromised nodes
ibeacons
gps
mobile adhoc network’s
healthcare
free space optics
wireless communication
rsu
model driven architecture
embedded sensors
domain specific language
mobile development
android
vanet
wimax
inverted-f antenna
time of arrival (toa)
angle of arrival (aoa)
non-line-of-sight (nlos)
adhoc networks
gpsr protocol
secured gpsr
network lifetime
sinkhole attack
distance
learning automata
packet scheduling
network disconnection.
transaction recovery
transaction log
flash memory
mobile transactions
network
trust
mobile & broadband wireless internet
network protocols & wireless networks
squashing function
bayesian estimator
soft computing
genetic algorithm
fuzzy logic
neural nets
mobile networks & wireless lan
networks
blockchain
distributed extensions of centralized graph theore
connectivity analysis under different mobility mod
shadowing
link distance
probability
delivery ratio
mac layer
wlan
wi-fi
gbdeer protocol
drqos
rate control
multipath routing
big data / cloud computing and networks
cooperation communication
work models
signal processing
origin destination matrix
cctv
mobile phone
technology
sensor node
applications
distributed file system.
mobile network
packet delivery ratio
v2v
deployment knowledge
resource allocation
security and privacy
communications
computer networks
v2i
its
machine learning
context
dynamic source routing (dsr)
mimo cooperative
ad hoc networks and on-demand routing protocols.
dsdv
bee colony algorithm
ubiquitous mobile computing
rule-based approach
context-awareness
multi-hop relay
amplify-and-forward
ieee 802.16j
protocols and algorithms
iot
rpl
wireless relay networks
coap
single copy routing scheme
key management
optimal power allocation
social based routing
delay tolerant networks
computing
grph massage
mact massage
zigbee
ieee 802.16
cluster
ad hoc network
air pollution
idsq
beacon communication range
range based location scheme
location sensing
mobile sink
lossless compression
pervasive system; smart space; resource mobility;
and algorithms
hyper-resolution-rule
distributed constraint satisfaction problem
arq
bit error rate
wireless channel
adaptive fec
gur game
packet loss ratio.
lifetime
clusters
multi-constrained routing multicasting
asymmetrical sensor networks
wireless sensor network (wsn); clustering; cluster
secure channel.
key agreement
third party
saved rebroadcast
probabilistic routing
reachability parameter
broadcast storm
isi
sdr
rrc
ber
hdtv
fair and efficient
trust establishment
mobile ad hoc networks
tcp variants
maodv
raodv
computer
zrp
energy efficient routing
multimedia networking
dynamic path switching
encryption key
wireless lan
ssid
shortest path algorithm
network based applications
wsns (wireless sensor networks)
radio range.
network operations & management
measurement & performance analysis
keyless entry system
infrared ray communication
wireless sensor network.
coverage holes
hole healing
remote control
obu
hybrid routing protocols
reactive routing protocols
proactive routing protocols
delay.
nodes
line of sight
adaption t
protocols
connected dominating set
secure routing protocol
report fabrication attack
cluster based wireless sensor network
experimentation
design
fl oating-point data
attacks
counterattacks and wireless sensor network
cross layer information
tcp
dsr
congestion control
ieee mac 802.11
transmission power.
signal-to-interference-plus-noise power ration
vanets
ad-hoc networks
secure routing algorithms and protocols based on g
evacuation routing algorithms and protocols for ve
algorithms for topology control and power assignme
algorithms for scheduling and resource allocation
approximation heuristics for np-complete problems
data gathering algorithms and protocols for sensor
applications of random graph theory in ad hoc netw
pdf
power nodes power control
adult education
literacy
classroom acts
learning environments
human-computer-interaction.
vehicle-to-everything (v2x) and autonomous cars
natural logic
natural vs. artificial intelligence
semantics-driven language processing.
distributed computing
architectural structure
design decisions and philosophies
natural language processing- named entity recognit
chunking
recurrent neural networks
transformer model
opnet simulation
pcf
rts/cts
jamming attack
unified security mechanism
data and knowledge representation
cyber-physical system (cps)
visualization of sensor data
wireless & mobile network security
exor
etx
wireless networks
life time
big data techniques
models and algorithms
big data infrastructure and platform
big data mining
wsn is formed by autonomous nodes with partial mem
communication range
power
and bandwidth. their occupation depends on inspect
comprising military
ecology
home or commercial and require a highly secured co
distributed extensions of centralized graph theo
connectivity analysis under different mobility m
data gathering algorithms and protocols for sens
storage space
key usage
elliptic curve cryptography.
coverage.
big data / cloud computing and networks
next generation internet
mobile devices
thin clients
remote display
information / content centric networks (icn)
services and applications
low power design
communication versus computation energy consumptio
real-time data delivery.
arbitrary directed graph
unidirectional ring
kinesthetic learning activity
kla
cs education
artificial immune systems
cryptography and coding
data integrity
fuzzy systems
information hiding
security management
quantum cryptography
security engineering
trust management
software security
sensors
recent computing
adhoc
ubiqitious
line of sigh
ai in network
scientific computing
computation models
compiler
hardware and os issues
education in computational sci
problem solving
quantum computing
distributed technology
mobile computing
artificial intelligence
baseband modulation
frequency
ch
ch selection
heterogeneous wsn
mobile ad hoc learning
atmospheric aggressiveness
time of wetness
corrosion
humid tropical climate
electronic commerce
grid security
secure cloud computing
broadband access networks
boundary control devices
communication network protocols
communication network architectures and design
deployments and implementations
vlsi design
communication systems
image processing
security and privacy for iot
iot applications and services
real time routing
routing messages
network routing
scheduling
context aware
image fusion
discrete wavelet transform (dwt)
agent
military sensor networks (msn).
anda
lid
energy factor
leach
lead
efficiency
dissipation
ad hoc
network protocols
reactive routing
flooding
mobility.
vehicular ad hoc networks
push-pull concept
opportunistic networks
w-man
intermittent connectivity
performance
pervasive computing
participatory sensing
confidence
privacy control
data confidentiality
integrity
packet loss
knowledge base management
reputation
data
communication
mobile
data aggregation and data gathering
compressive data gathering
covert channel
subliminal channel
hybrid covert channel
trapdoors
trust.
identity management
access management
digital identity
idm taxonomies
identity management survey
tora
end to end delay
throughput.
fingerprint
encryption
decryption
minutiae point
daylight substitution.
stochastic deployments
statistical analysis
analytical hierarchy process
aggregation
police patrols
wireless sensor networks (wsn)
mobile ad hoc networks (manet)
vehicular ad hoc networks (vanet)
vehicular ad hoc and sensor network (vasnet)
data fusion
localization
routing.
battery power
lifetime of wireless sensor network
minimum energy cost routing
optimal flow
linear programming problem.
mobility models
olsr
vbr
cbr
advanced it bio/ medical engineering
cloud computing
digital convergence
adaption tree
wireless body area network
body sensor network
wban survey.
signal-to-interference-plus-noise power ration (si
and transmission power.
data gathering
power aware
remote monitoring
fabrication
target coverage problem
greedy heuristic
mobile ad-hoc network
on-demand routing protocols
mobility
medium acess control
latency.
ad hoc tree structure
clock synchronization
hierarchical sensor network.
cbc
mild
mimd
aetf
contention window
fairness
delay
vehicular ad hoc network
message propagation
free flow
congested flow
game theory
asynchronous distributed pricing
distributed resource allocation
location privacy
secure routing
context summarization
See more