Preferred Language
Articles
/
jih-1400
Real-time control for the transmission of information in wireless networks
...Show More Authors

Wireless  lietworking is·  constantly improving,  changing  and

though  ba ic  principle  is the same.  ['nstead of  using standard  cables  to transmit information fmm one point to another (qr more), it .uses  radio signals.  This paper  presents .a case  study considedng real-time remote

cqntroJ using Wireless UDP/JP-based networks,. The aim of-this werk is to

reduce  real-time· remote control  system  based upon a simulatio.n  model,

which can operate via general communication  l"]etworks, whieh on bodies. modern wireles  tcchnolqgy.

The  first  part includes· a  brief  study  oJ  wireless  commun.ication p.rinciples as well as a short description of the c-urrent system. Tbe second part describes  measurement  of the sy;>rem and in addition to · analysis 6f the  test  results.  The  conclu.sio:ps  whjcb     are   made  ba ed   pan   the measured data of :the system. Also, fhe encountered  problems  during   he

test simulations are raised up. A s.imulated process for the model is used

in.stead  of a reaJ one in  order to get comp(!rable results; ho.wever it

Indicate? a. goed research  tool and a basis for future work in the real-time

remote control  research.  Als0, Some future- development schemes  of the

system are· discussed as we.!I.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
The effect of using XCAST based routing protocol in wireless ad hoc networks
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (244)
Crossref (198)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Simulation based comparison of routing protocols in wireless multihop adhoc networks
...Show More Authors

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 24 2014
Journal Name
Wireless Personal Communications
Multi-layer Genetic Algorithm for Maximum Disjoint Reliable Set Covers Problem in Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (22)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Soft Computing
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Aug 25 2012
Journal Name
Wireless Personal Communications
Multi-Objective Evolutionary Algorithm Based on Decomposition for Energy Efficient Coverage in Wireless Sensor Networks
...Show More Authors

Scopus (57)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Engineering And Sustainable Development
Improving Performance Classification in Wireless Body Area Sensor Networks Based on Machine Learning Techniques
...Show More Authors

Wireless Body Area Sensor Networks (WBASNs) have garnered significant attention due to the implementation of self-automaton and modern technologies. Within the healthcare WBASN, certain sensed data hold greater significance than others in light of their critical aspect. Such vital data must be given within a specified time frame. Data loss and delay could not be tolerated in such types of systems. Intelligent algorithms are distinguished by their superior ability to interact with various data systems. Machine learning methods can analyze the gathered data and uncover previously unknown patterns and information. These approaches can also diagnose and notify critical conditions in patients under monitoring. This study implements two s

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref