Articles with "source nodes" as a keyword



Photo from wikipedia

Multi-source detection based on neighborhood entropy in social networks

Sign Up to like & get
recommendations!
Published in 2022 at "Scientific Reports"

DOI: 10.1038/s41598-022-09229-2

Abstract: The rapid development of social networking platforms has accelerated the spread of false information. Effective source location methods are essential to control the spread of false information. Most existing methods fail to make full use… read more here.

Keywords: source; neighborhood entropy; source nodes; existing methods ... See more keywords
Photo by jontyson from unsplash

QoS-Aware Enhanced-Security for TDMA Transmissions from Buffered Source Nodes

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Wireless Communications"

DOI: 10.1109/twc.2016.2636201

Abstract: This paper proposes a cross-layer design to enhance the security of a set of buffered legitimate source nodes wishing to communicate with a common destination node using a time-division multiple-access scheme with probabilistic time slot… read more here.

Keywords: source nodes; source; time; security ... See more keywords
Photo from wikipedia

Multi-User AF Relay Networks with Power Allocation and Transfer: A Joint Approach

Sign Up to like & get
recommendations!
Published in 2019 at "Energies"

DOI: 10.3390/en12163157

Abstract: The Internet-of-Things (IoT) framework has been considered as an enabler of the smart world where all devices will be deployed with extra-sensory power in order to sense the world as well as communicate with other… read more here.

Keywords: source nodes; power; power allocation; transfer ... See more keywords