牵索 发表于 2025-3-25 04:54:45
http://reply.papertrans.cn/43/4228/422800/422800_21.png抛射物 发表于 2025-3-25 09:54:35
dynamic environments. In this paper, we propose a new improvement on DSDV, which is one of the most popular proactive routing protocols in MANETs. We introduce a new metric called . in order to represent the changes in the network topology due to mobility. We determine a threshold value based on thdefeatist 发表于 2025-3-25 14:02:06
work by improving the energy-efficiency, the freshness of collected data and reducing the network traffic and message conflicts. Due to the constraints on sensor nodes’ energy resources and the vulnerability of the distributed infrastructure of wireless networks, an efficient, scalable and accurateaesthetic 发表于 2025-3-25 18:35:03
http://reply.papertrans.cn/43/4228/422800/422800_24.png缓和 发表于 2025-3-25 21:53:42
http://reply.papertrans.cn/43/4228/422800/422800_25.pngFILLY 发表于 2025-3-26 03:51:42
http://reply.papertrans.cn/43/4228/422800/422800_26.png多产子 发表于 2025-3-26 05:54:09
http://reply.papertrans.cn/43/4228/422800/422800_27.pngClinch 发表于 2025-3-26 10:19:31
Norbert Berthold,Holger Frickeesting and intelligent transportation. In order to extend the lifetime of WSNs, it is necessary to reduce the energy consumption of sensors. To achieve the large-scale and flexible deployment, the wireless sensors are required to be low memory overhead. The existing WSN routing protocols are difficuBUOY 发表于 2025-3-26 13:41:14
Thorsten Hellmann,Matthias Kullasireless applications. This paper deals with the power allocation strategies for nearby users’ high speed download services to effectively address the energy consumption of D2D communications underlying cellular systems. Energy efficiency maximization problems are analyzed with respect to ergodic sumModicum 发表于 2025-3-26 17:58:59
Thomas Mannal-time data emanating from the consumers and offer dynamic adjustments to the power generation and transmission. However, the periodical transmission of consumption reports from the smart meters towards the USPs over public channels exposes the exchanged messages to attacks such as eavesdropping, m