Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …
Energy harvesting sensor nodes: Survey and implications
S Sudevalayam, P Kulkarni - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Sensor networks with battery-powered nodes can seldom simultaneously meet the design
goals of lifetime, cost, sensing reliability and sensing and transmission coverage. Energy …
goals of lifetime, cost, sensing reliability and sensing and transmission coverage. Energy …
[KÖNYV][B] Protocols and architectures for wireless sensor networks
H Karl, A Willig - 2007 - books.google.com
Learn all you need to know about wireless sensor networks! Protocols and Architectures for
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
Resource allocation for underlay cognitive radio networks: A survey
For conventional wireless networks, the main target of resource allocation (RA) is to
efficiently utilize the available resources. Generally, there are no changes in the available …
efficiently utilize the available resources. Generally, there are no changes in the available …
Challenges for efficient communication in underwater acoustic sensor networks
Ocean bottom sensor nodes can be used for oceanographic data collection, pollution
monitoring, offshore exploration and tactical surveillance applications. Moreover, Unmanned …
monitoring, offshore exploration and tactical surveillance applications. Moreover, Unmanned …
MAC essentials for wireless sensor networks
The wireless medium being inherently broadcast in nature and hence prone to interferences
requires highly optimized medium access control (MAC) protocols. This holds particularly …
requires highly optimized medium access control (MAC) protocols. This holds particularly …
Security issues of mobile ad hoc and sensor networks
D Djenouri, L Khelladi, N Badache - 2005 - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …
of wireless links, the limited physical protection of nodes, the dynamically changing …
Infotainment and road safety service support in vehicular networking: From a communication perspective
Vehicular ad hoc networking is an emerging technology for future on-the-road
communications. Due to the virtue of vehicle-to-vehicle and vehicle-to-infrastructure …
communications. Due to the virtue of vehicle-to-vehicle and vehicle-to-infrastructure …
Modeling interference in wireless ad hoc networks
P Cardieri - IEEE Communications Surveys & Tutorials, 2010 - ieeexplore.ieee.org
The recent increasing interest in ad hoc networks has motivated the study and development
of interference models capable of capturing the intrinsic characteristics of this kind of …
of interference models capable of capturing the intrinsic characteristics of this kind of …
[KÖNYV][B] The electronics handbook
JC Whitaker, MH Kryder, JF Shackelford, VK Tripathi… - 2018 - taylorfrancis.com
During the ten years since the appearance of the groundbreaking, bestselling first edition of
The Electronics Handbook, the field has grown and changed tremendously. With a focus on …
The Electronics Handbook, the field has grown and changed tremendously. With a focus on …