Peruzzo et al., 2018 - Google Patents
A power efficient adaptive data rate algorithm for LoRaWAN networksPeruzzo et al., 2018
- Document ID
- 12274377819745592095
- Author
- Peruzzo A
- Vangelista L
- Publication year
- Publication venue
- 2018 21st international symposium on wireless personal multimedia communications (WPMC)
External Links
Snippet
LoRaWAN networks have recently started to play a key role in the framework of Low Power Wide Area Network (LPWAN) for Internet of Things. In Internet of Things a crucial aspect is the reduction of energy consumption and in LPWAN, where there is a huge number of …
- 238000004422 calculation algorithm 0 title abstract description 54
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; Arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Peruzzo et al. | A power efficient adaptive data rate algorithm for LoRaWAN networks | |
CN111245539A (en) | An efficient resource allocation method for mobile edge computing network based on NOMA | |
James | IoT cybersecurity based smart home intrusion prevention system | |
Kadhim | 5G and next generation networks | |
Zhang et al. | Deep neural network based channel allocation for interference-limited wireless networks | |
Li et al. | Convolutional neural network-based split prediction for VVC intra speedup | |
Gupta et al. | Security Enhancement Using Quantum Cryptography in WSN | |
Urosevic et al. | BER performances of virtual QOSTBC in P2P communications under imperfect channel estimation | |
Garnepudi et al. | Sum secrecy rate maximization for control jamming assisted star-ris wireless network | |
Kim | Ultra‐Reliable and Low Latency Communication Systems | |
Shukri et al. | Evaluating the Energy Efficiency of NOMA 5G with Regard to the Capacity and Coverage | |
Cui et al. | Quota Matching-based Task Offloading for WSN in Smart Grid | |
Saeed | Cognitive Radio and advanced spectrum management | |
Kodavati et al. | Latency based Re-Enforcement Learning over Cognitive Software Defined 5G Networks | |
Zhang et al. | Analysis of the use cases and technical enhancements of TSN | |
Sendin et al. | Wireless IoT technologies | |
Jain et al. | Rateless Code-Aided Transmission Scheme to Achieve Secrecy in a Delay-Constraint Environment | |
Tolba et al. | Securing Task Computation Offloading for Mobile Edge Computing in Untrusted Relay Networks | |
Janardhanan | Silicon Technologies for Next Generation 5G Architectures and Applications | |
Srivastava et al. | Communication Performance and Factors that Affect It | |
Zhou et al. | A Federated Learning and DQN based Cooperative Resource Allocation Algorithm for Multi-Service MEC Networks | |
Sheikh et al. | An Energy-Efficient Approach for the Security of IoT Networks using SCEER | |
Huang et al. | Mobile User Pairing Scheme in NOMA-Enabled Backscatter Communication Networks | |
Ochiai et al. | Adaptive step size control for update of activation probability in online probabilistic BS activation control method | |
Allah Gholi Ghasri et al. | A Generalized Framework for Joint Dynamic Optimal RF Interface Setting and Next-Hop Selection in IoT networks with Similar Requests |