The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy harvesting is emerging as a promising alternative source to power the next generation of wireless networks. This paper introduces a new energy harvesting strategy that uses a dedicated energy source to optimally replenish energy for radio frequency (RF) based wireless communication systems. Specifically, we develop a two-step dual tunnel energy requesting (DTER) strategy that allows an energy...
In this paper, we investigate the impact of antenna orientation on the performance of wireless sensor networks. In the experiments conducted using Crossbow MicaZ motes we realized that the antenna orientation has a significant impact on the received signal strength (RSSI). It thus becomes important to incorporate the effects on RSSI due to variations in antenna orientations while performing simulations...
Energy efficiency improvement methods can be applied at different layers of the network architecture for mobile ad-hoc networks. There have been many research efforts on improving the performance parameters at physical, data link, and network layers. The properties of directional antennas have been exploited for better energy efficiency. Some of the properties include simultaneous multiple transmissions,...
Adaptation is a very crucial aspect of intrusion tolerance. In order to be tolerant in front of an attack, applications must change its security policies to be adaptive to the damaged environment. But selection of suitable optimal security policy for typical conditions and network environment is found to be a multi-criteria decision making problem. The procedure is found to be unstructured, characterized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.