Academia.eduAcademia.edu

Wireless Networks (Computer Science)

description2,108 papers
group66,482 followers
lightbulbAbout this topic
Wireless networks are communication systems that transmit data over radio waves or infrared signals without physical connections. They enable devices to connect and communicate over short or long distances, facilitating mobility and flexibility in data exchange, and are essential for various applications in computer science, including internet access and mobile communications.
lightbulbAbout this topic
Wireless networks are communication systems that transmit data over radio waves or infrared signals without physical connections. They enable devices to connect and communicate over short or long distances, facilitating mobility and flexibility in data exchange, and are essential for various applications in computer science, including internet access and mobile communications.

Key research themes

1. How can stochastic geometry and related mathematical frameworks enhance modeling and performance analysis of wireless networks?

This research area focuses on employing advanced mathematical models, particularly stochastic geometry and point process theory, to rigorously analyze and predict the behavior and performance of wireless networks under spatial uncertainties. It matters because wireless nodes' locations in large-scale networks are inherently random and affect connectivity, interference, and coverage, which in turn impacts network design and protocol optimization.

Key finding: This work provides a comprehensive introduction to stochastic geometry and its application in wireless networks modeling. It rigorously develops point process theory tools and applies them to model node distributions,... Read more
Key finding: While broadly covering wireless sensor networks, this work includes discussions on routing, congestion control, and quality of service support that depend on understanding node placement and network topology, implying the... Read more
Key finding: This study explores emerging wireless technologies such as RIS-aided ISAC systems, where spatial configurations and propagation paths lead to complex interference phenomena. Although more applied, the analysis leverages... Read more

2. What are the challenges and solutions for Quality of Service (QoS) management in next-generation wireless networks, particularly 5G and IoT networks?

This theme investigates how to ensure reliable, efficient, and fair resource allocation in complex and heterogeneous wireless environments like 5G and IoT networks. QoS management underpins network performance guarantees important for diverse applications with varying demands (e.g., low latency, high throughput). The research emphasizes intelligent, adaptive scheduling and resource management techniques, including machine learning and reinforcement learning.

Key finding: The paper proposes a reinforcement learning-based scheduling algorithm for LoRaWAN IoT applications that dynamically optimizes resource allocation, achieving improved throughput, reduced latency, and energy savings compared... Read more
Key finding: This work discusses the complexity of 5G QoS scenarios and proposes AI-based cognitive engines that utilize machine learning to monitor and optimize network resource distribution, improving subscriber quality of experience... Read more
Key finding: This study builds upon 5G QoS management challenges by introducing a memory-based AI cognitive engine to handle multi-service resource allocation more fairly among competing applications. By interpreting probabilistic... Read more

3. How can artificial intelligence and associated technologies improve wireless network security, monitoring, and user experience?

This area covers the deployment of AI techniques—including deep learning, machine learning, and AI integration with blockchain—to enhance wireless network security, threat detection, traffic analysis, and usability. Given the increasing complexity and threat landscape of wireless networks, AI provides adaptive, scalable, and robust means for real-time monitoring, anomaly detection, and autonomous defense mechanisms, as well as educational tools for security awareness.

Key finding: The project designs an independent device for ethical Wi-Fi testing using ESP8266 that enables scanning of networks and execution of controlled layer 2 attacks, such as Deauthentication and Beacon Flooding. This serves as... Read more
Key finding: This thesis highlights AI's transformative impact on network traffic analysis, demonstrating how AI-based pattern recognition and anomaly detection enhance security monitoring and improve performance management within complex... Read more
Key finding: This survey investigates the integration of AI and blockchain clustering techniques as promising solutions to address critical security challenges in emerging 6G networks. It identifies how AI enhances threat detection and... Read more

All papers in Wireless Networks (Computer Science)

—This demo presents Oi!, an opportunistic data transmission tool. Implemented on Android and available as open-source, Oi! relies on social interaction, device-to-device short-range wireless transmission, as well as on history of contact... more
The millimeter wave (mmWave) frequency band is seen as a key enabler of multi-gigabit wireless access in future cellular networks. In order to overcome the propagation challenges, mmWave systems use a large number of antenna elements both... more
The use of the Internet is growing in this day and age, so another area has developed to use the Internet, called Internet of Things (IoT). It facilitates the machines and objects to communicate, compute and coordinate with each other. It... more
8th International Conference on Computer Networks & Data Communications (CNDC 2021) will provide an excellent international forum for sharing knowledge and results in theory and applications of Computer Networks and Data Communications.... more
A evolução e implícita revolução causada pela utilização das redes sem fio é discutida através de uma apresentação de suas tecnologias mais relevantes e seus domínios de aplicação atuais e futuros.
Increased density of wireless devices, ever growing demands for extremely high data rate, and spectrum scarcity at microwave bands make the millimeter wave (mmWave) frequencies an important player in future wireless networks. However,... more
International Journal of Computer Science and Technology (IJCST) is devoted to fields of Computer Science and Technology. The IJCST is a open access peer-reviewed scientific journal published in electronic form as well as print form. The... more
The aim of this study is to analyse the file transfer performance based on CPU, RAM and Packet Loss as a baseline using wired and wireless connections on IPv6 environment. This study was carried out because nowadays most researchers tend... more
High dimensional data is frequently found in various field of study basically in the process of running data analysis; individuals have applied the various techniques available to manage high dimensional data. However, Principal... more
Software testing is used to test the developed system to find the errors and defects in the software. To find the errors and defects in the software system test cases are generated. Test cases generation based on three parts i.e. coding,... more
— L'intérêt pour les réseaux de capteurs sans fil s'est considérablement accru. Ils ont fait l'objet de plusieurs travaux de recherche ces dernières années. Néanmoins, ces réseaux sont confrontés à de multiples problèmes. Parmi ces... more
Blockchain allows transactions to be performed much faster than is possible in traditional centralized systems. To provide decentralized payment application to the users. It can be very cost effective. Using Ethereum and Solidity... more
With so many people now wearing mobile devices with sensors (such as smartphones), utilizing the immense capabilities of these business mobility goods has become a prospective skill to significant behavioural and ecological sensors. A... more
In early, IEEE introduced 802.11 standards for Wireless Local Area Networks (WLANs). Due to the rapid increase in the human demand of wireless networks worldwide. It required efficiency for the current generation, IEEE introduced the... more
6th International Conference on Computer Science, Engineering and Information Technology (CSITY 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer... more
Pour la première fois de son histoire, le Club scientifique de l’Université des Sciences et Technologies Houari Boumedienne, a organisé une série de conférences sur le futur numérique et comment l’envisager. Comment s’harnacher utilement... more
ABSTRAK. Penelitian ini bertujuan untuk menganalisis penempatan access point (AP) pada jaringan WLAN STMIK Asia Malang. Pendekatan pertama dilakukan melalui site survey, dengan tujuan yakni mendapatkan informasi yang cukup mengenai jumlah... more
One of the major issues in Target-coverage problem of wireless sensor network is to increase the network lifetime. This can be solved by selecting minimum working nodes that will cover all the targets. This paper proposes a completely new... more
This book chapter discusses the nature-inspired metaheuristic firefly algorithm (FA) applied in telecommunications. FA has been developed based on the behavior of the fireflies and the light emit, where the brightest firefly attracts the... more
With the expansion of information interchanges innovation, the interest for Higher Data Rate Services, for example, interactive media, voice, and information over both wired and remote connections is likewise expanded OFDM is transmission... more
Many of us think of the Internet as a global community. But two-thirds of the world’s population does not yet have Internet access. Project Loon is a network of balloons traveling on the edge of space, designed to connect people in rural... more
Cloud computing offerings a distinctive way to share distributed resources, cloud computing is a type of Internet-based sharing of distributed assets through web. It is a model that empowerment prevalent, on-demand access to a shared... more
Recent trends in wireless technologies are expansion of Ad-hoc networks. Mobile Ad-hoc Networks (MANETs) are becoming more essential to wireless communications due to growing popularity of mobile devices. Ad-hoc networks are multi-hop... more
In this paper we investigate the system level performance of an Orthogonal Frequency Division Multiplexing (OFDM) Wireless LAN network enhanced through Multiple-Input Multiple-Output (MIMO) techniques and compare it to the performance of... more
Green Computing also called Green Technology, is the environmentally sustainable to use of computers and related resources like-monitors, printers, storage devices networking & communication system - no impact on the environment Green... more
The vehicular ad hoc network is the decentralized type of network in which vehicle nodes can join or leave the network when they want. The vehicular network is much vulnerable to security attacks which affect network performance. The... more
Internet of Things (IoT) and cloud computing yield great benefits by providing remote and efficient services. The aim of the project entitled as “Novel approach for IoT based Patient Health Monitoring System Using Wearable Sensors” is to... more
— Android based training and placement automation for campus drive is a System, which automates training and placement activities and provides opportunities to the students, who are eligible according to the company criteria and makes... more
With the advent of technology and the Internet, a great transformation has been created in the world, and with the growing popularity of it, information and technology activists are thinking about using the Internet in different parts of... more
In case of calamity, remain connected with one another using satellite phones where other technologies leave you alone.
Nowadays with evolving technologies, it is possible to connect real world with virtual world by using some intelligent sensors or physical object. Internet of Things (IoT) is one of such technology. The rise of interest in IoT is leading... more
The bot’s purpose is to make the Discord server a bit more fun by making it interactive and interesting. This bot brings together various people from all over the world and helps them remain connected to each other. Once people join the... more
Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. There is an urgent need for a new generation of computational theories and tools to assist... more
— Code Division Multiple Access (CDMA) uses spread spectrum technology where each user is assigned a code and allows multiple users to be multiplexed over the same physical channel. Whereas the time division multiple access (TDMA) divides... more
The International Journal of Next - Generation Network ( IJNGN) transports all information and services such as voice, data and media by encapsulating these into packets. Limitations of Internet era can be overcome by Next-generation... more
This paper presents an innovative redesign of a doorbell system in order to eliminate unnecessary ringing noise from users' daily life. Employing artificial intelligence for face recognition, the IoT doorbell system define the visitors as... more
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
Proposal of cyber security measures in companie. Cyber security is currently the most wanted and most challenging research discipline that is in constant development. Data reference institutions and recognized to security researchers in... more
In the last few years, many fake websites have developed on the World Wide Web to harm users by stealing their confidential information such as account ID, user name, password, etc. Phishing is the social engineering attacks and currently... more
In today’s lifestyle, Health has become a serious issue which directly affects quality of LIFE of a person. Health problems like cardiac failure, high blood pressure and diabetic patient needs to monitor problem on regular basis. This... more
The students of undergraduate expect simple, teaching. But, in many universities, instructors simply follow text books and solve the examples given in it. In such case, students cannot learn anything defined in the syllabus. This method... more
 Abstract— Network is defined as a combination of two or more nodes which are connected with each other. It allows nodes to exchange data from each other along the data connections. Routing is a process of finding the path between source... more
It is estimated that by 2020 there could be as many as 4 million visually impaired or blind people living in the UK. These visually impaired or blind people will use assistive technologies such as screen readers to access website content... more
Wireless Body Area Networks (WBANs) are rapidly evolving research field for patients' health monitoring and immediate medical response. In WBANs, tiny biosensor nodes deployed on body sense physiological data of patients and transmit it... more
Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire... more
Data mining is the use of automated data analysis techniques to uncover previously undetected relationships among data items. Mining frequent item sets is one of the most important concepts of data mining. Frequent item set mining has... more
12th International Conference on Computer Science, Engineering and Applications (CCSEA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and... more
Close Circuit TV (CCTV) imaging plays a very important role in security and crime control. Continuous observation of the CCTV recording is a tedious job and an alternate solution is the automatic analysis of the scene. Automatic detection... more
Scope & Topics The International journal of Software Engineering & Applications (IJSEA) is a BiMonthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering &... more
Download research papers for free!