Academia.eduAcademia.edu

Wireless Networks (Computer Science)

description2,107 papers
group66,453 followers
lightbulbAbout this topic
Wireless networks are communication systems that transmit data over radio waves or infrared signals without physical connections. They enable devices to connect and communicate over short or long distances, facilitating mobility and flexibility in data exchange, and are essential for various applications in computer science, including internet access and mobile communications.
lightbulbAbout this topic
Wireless networks are communication systems that transmit data over radio waves or infrared signals without physical connections. They enable devices to connect and communicate over short or long distances, facilitating mobility and flexibility in data exchange, and are essential for various applications in computer science, including internet access and mobile communications.

Key research themes

1. How can stochastic geometry and related mathematical frameworks enhance modeling and performance analysis of wireless networks?

This research area focuses on employing advanced mathematical models, particularly stochastic geometry and point process theory, to rigorously analyze and predict the behavior and performance of wireless networks under spatial uncertainties. It matters because wireless nodes' locations in large-scale networks are inherently random and affect connectivity, interference, and coverage, which in turn impacts network design and protocol optimization.

Key finding: This work provides a comprehensive introduction to stochastic geometry and its application in wireless networks modeling. It rigorously develops point process theory tools and applies them to model node distributions,... Read more
Key finding: While broadly covering wireless sensor networks, this work includes discussions on routing, congestion control, and quality of service support that depend on understanding node placement and network topology, implying the... Read more
Key finding: This study explores emerging wireless technologies such as RIS-aided ISAC systems, where spatial configurations and propagation paths lead to complex interference phenomena. Although more applied, the analysis leverages... Read more

2. What are the challenges and solutions for Quality of Service (QoS) management in next-generation wireless networks, particularly 5G and IoT networks?

This theme investigates how to ensure reliable, efficient, and fair resource allocation in complex and heterogeneous wireless environments like 5G and IoT networks. QoS management underpins network performance guarantees important for diverse applications with varying demands (e.g., low latency, high throughput). The research emphasizes intelligent, adaptive scheduling and resource management techniques, including machine learning and reinforcement learning.

Key finding: The paper proposes a reinforcement learning-based scheduling algorithm for LoRaWAN IoT applications that dynamically optimizes resource allocation, achieving improved throughput, reduced latency, and energy savings compared... Read more
Key finding: This work discusses the complexity of 5G QoS scenarios and proposes AI-based cognitive engines that utilize machine learning to monitor and optimize network resource distribution, improving subscriber quality of experience... Read more
Key finding: This study builds upon 5G QoS management challenges by introducing a memory-based AI cognitive engine to handle multi-service resource allocation more fairly among competing applications. By interpreting probabilistic... Read more

3. How can artificial intelligence and associated technologies improve wireless network security, monitoring, and user experience?

This area covers the deployment of AI techniques—including deep learning, machine learning, and AI integration with blockchain—to enhance wireless network security, threat detection, traffic analysis, and usability. Given the increasing complexity and threat landscape of wireless networks, AI provides adaptive, scalable, and robust means for real-time monitoring, anomaly detection, and autonomous defense mechanisms, as well as educational tools for security awareness.

Key finding: The project designs an independent device for ethical Wi-Fi testing using ESP8266 that enables scanning of networks and execution of controlled layer 2 attacks, such as Deauthentication and Beacon Flooding. This serves as... Read more
Key finding: This thesis highlights AI's transformative impact on network traffic analysis, demonstrating how AI-based pattern recognition and anomaly detection enhance security monitoring and improve performance management within complex... Read more
Key finding: This survey investigates the integration of AI and blockchain clustering techniques as promising solutions to address critical security challenges in emerging 6G networks. It identifies how AI enhances threat detection and... Read more

All papers in Wireless Networks (Computer Science)

This study advances the thesis that Bitcoin constitutes the first instantiation of “perfect money,” uniting the desiderata of classical monetary theory with the invariants of physics, computation, and information theory. Unlike gold,... more
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach... more
This short note addresses a popular misconception-that new technologies such as spread spectrum have eliminated the problem of radio interference. That is false. Spread spectrum is a great technology, but it does not eliminate the problem... more
Cybersecurity professionals primarily focus on assessing risk profiles and developing strategies to mitigate them effectively. A key goal in this domain is to design robust methods that strengthen security measures. The integration of... more
The next generation mobile devices will be enabled with the ability to support multiple types of networks i.e. the terminal supports multiple network interface. The key enablingfunction for achieving seamless mobility and seamless service... more
Quantum cryptography represents a breakthrough in secure communication, leveraging the principles of quantum mechanics to create encryption methods that are theoretically immune to classical computational attacks. This paper explores the... more
This paper is intended to present optimal route finding system for road network application. It is used to operate in complicated mapping situations and new unknown environments. This technique can be implemented to find the optimal path... more
2 Abstract: Many applications would require fast data transfer in high speed wireless networks. In transmission control protocol (TCP) cannot effectively utilize the network capacity in wireless networks. In this paper, We propose a RACC... more
Wireless sensor network (WSN) require a various power management protocols to reduce the energy consumption. But the lifetime of sensor network greatly depend on their battery. Radio irregularity and fading in multihop WSN also affect... more
The rising popularity of multimedia applications and potential commercial usage of Mobile Ad hoc network (MANET) clearly indicates that Quality of Service (QoS) support in MANETs is an unavoidable task. Essentially, Multimedia traffic... more
Cloud computing has revolutionized how organizations and individuals store, access, and interact with data, software, and computing resources. Public cloud platforms offer scalable, cost-efficient, and globally accessible services, often... more
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative study of QoS based routing in... more
This paper presents the development of a web application, which aims to provide a platform for white paper authors to upload and have their documents reviewed by industry experts and scholars. The web app will utilize Ethereum block chain... more
Psychotronic weapons, utilizing electromagnetic, sonic, or other energy-based technologies to influence human behavior, cognition, or emotions, represent a profound and controversial technological frontier. This timeline chronicles... more
Based on IEEE 802.11 Distributed Coordination Function (DCF), Persistent Relay Carrier Sense Multiple Access (PRCSMA) was proposed for cooperative transmission with two or more relay nodes. We propose random assigning of the initial... more
First of all, I would to thank my tutor Professor Floriano De Rango for the possibility he offered to me to accomplish a productive PhD path and for the invaluable support that he gave to me in these years. This experience, has enabled me... more
At the transport layer of the Open System Interconnection (OSI) model, the transmission control protocol (TCP) is a major protocol used in today's communication over the Internet. The TCP is designed to provide a reliable end-to-end... more
Worldwide Interoperability for Microwave Access (WiMAX) deployment is growing at a rapid pace. Since Mobile WiMAX has the key advantage of serving large coverage areas per base station, it has become a popular emerging technology for... more
Worldwide Interoperability for Microwave Access (WiMAX) deployment is growing at a rapid pace. Since Mobile WiMAX has the key advantage of serving large coverage areas per base station, it has become a popular emerging technology for... more
Prolong node's lifetime that is limited by its battery, as long as possible is an important factor during wireless sensor network designing. Several routing algorithm have been adopted to manage the energy strategy of WSNs.... more
The development of Directional Medium Access Control (DMAC) strategies that allow to enhance the limitations due to the use of omnidirectional antennas in Mobile ad Hoc Networks (MANET), introduces several issues that need to be properly... more
Homes, offices and vehicles are getting networked. This will enable context aware, autonomous operation of many support systems that could be controlled remotely. To achieve this there would be a large number of tiny devices -sensors and... more
GHz radio is a very attractive technology for short-range wireless communication due to its capability to provide Gbps data rate. To address the neighbor discovery (ND) problem in 60 GHz networks, we propose a novel analytical framework... more
Wireless sensor networks (WSNs) are made up of a large number of tiny sensors, which can sense, analyze, and communicate information about the outside world. These networks play a significant role in a broad range of fields, from crucial... more
Qilin ransomware was a sophisticated cyber-attack that targeted critical infrastructure systems in various locations around the world. The attacks were highly sophisticated. Qilin was able to bypass authentication and execute remote code... more
India's tourism industry, a vital contributor to economic growth, has rapidly embraced digital platforms for bookings, payments, and travel management. However, this digital transformation has exposed tourists, tourism businesses, and... more
systems have evolved Q3 considerably in recent years, encouraging the deployment of multiple systems or multi-cellular technology, and improving the quality of service (QoS) offered to mobile users. For example 4G systems offers better... more
The future of India will be formed in the lecture hall. Whereas India has made great steps in refining the education system but much still remains to be complete. If you see the current situation then you will find that there is a torrent... more
The unprecedented increase of wireless devices is now facing a serious threat of spectrum scarcity. The situation becomes even worse due to inefficient frequency distribution protocols, deployed in trivial Wi-Fi networks. The primary... more
Mining software repositories (MSR) research had significantly contributed to software engineering. However, MSR results integration across repositories is a recent concern that is getting more attention from researchers each day. Some... more
Cellular networks are optimized by targeting multiple objectives. Usually, the different objectives are not coherent: minimizing the transmit power; the number of base station (BS) sleep-mode switchings, ie, ACTIVE/SLEEP state... more
The integration of computer-based technologies interacting with industrial machines or home appliances through an interconnected network, for teleoperation, workflow control, switching to autonomous mode, or collecting data automatically... more
This paper presents NFO, a new and innovative technique for collision resolution based on single dimensional arrays. Hash collisions are practically unavoidable when hashing a random subset of a large set of possible keys and should be... more
Social engineering exploits human nature to bypass technical security controls and is thus a threatening cyber-attack. This paper explains common techniques such as phishing and pretexting, examines real-world examples, and explains why... more
Most individuals don't have enough time in their busy daily schedules to practice gardening, despite the fact that it's essential to making cities green by maintaining rooftop gardens. In this project, we attempted to make gardening... more
In today's world, safely transferring data is very important which means how cryptographic algorithms behave in different programming languages matters a lot to those designing systems. This work examines the results of key cryptographic... more
A novel approach that seamlessly integrates human action recognition and object detection in hybrid deep learning architectures for the enhancement of accuracy in shoplifting prevention and detection remains largely unexplored to date.... more
The advent of 6G wireless technology, which offers previously unattainable data rates, very low latency, and compatibility with a wide range of communication devices, promises to transform the networking environment completely. The 6G... more
This study investigates the impact of ICT-based assessment tools on student performance in Islamic Studies at Adamu Augie College of Education, Argungu, Kebbi State. As digital transformation becomes essential in modern education,... more
Various routing protocols have been designed and developed for Wireless Sensor Networks. They face various challenges. Sensor nodes are strongly energy and storage constrained, also failure rate of sensor node is very high. As, energy... more
Energy efficiency is a major issue of concern in mobile ad hoc networks (MANETs) as mobile nodes rely on batteries, which are limited source of power, and in several environments, it is quite unwieldy task to replace or renew them.... more
The purpose of this paper is to introduce a new type of open sets called mI-open sets and quasi-mI-open sets in minimal ideal topological spaces and investigate the relation between minimal structure space and minimal ideal structure... more
The fashion industry is undergoing a significant transformation fueled by advancements in artificial intelligence (AI) and machine learning (ML), highlighting an increasing need for personalized fashion recommendations. This paper... more
Deep learning is a robust framework for solving complex prediction and forecasting problems from multiple fields, such as weather sciences. Due to the abundance and higher resolution of data available, cloud-based deep learning offers a... more
Mobile Ad hoc Network (MANET) is one of the Adhoc networks with mobile nodes. Dynamic topology, no permanent infrastructure, no central administration are feature which makes. AODV routing protocol is insecure from various attacks. Black... more
In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for research and development. As popularity of wireless networks and mobile devices has considerably improved over the past few years, wireless ad hoc... more
In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for research and development. As popularity of wireless networks and mobile devices has considerably improved over the past few years, wireless ad hoc... more
UAVs are being increasingly used in military and commercial areas alike. They often carry sensitive information making them vulnerable to cybersecurity attacks. Potential security vulnerabilities may also exist in the modules used for... more
Download research papers for free!