Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3967393 | PMC |
http://dx.doi.org/10.1155/2014/913046 | DOI Listing |
There remains a scarcity of studies to evaluate the treatment effect of electroconvulsive therapy (ECT). Functional near-infrared spectroscopy (fNIRS) offers a cost-effective method to measure cerebral hemodynamics. This study used fNIRS to evaluate the effect of ECT in patients suffering from schizophrenia or bipolar disorder (manic phase).
View Article and Find Full Text PDFSci Rep
January 2025
North Carolina School of Science and Mathematics, Durham, NC, 27705, USA.
Mobile Ad Hoc Networks (MANETs) are increasingly replacing conventional communication systems due to their decentralized and dynamic nature. However, their wireless architecture makes them highly vulnerable to flooding attacks, which can disrupt communication, deplete energy resources, and degrade network performance. This study presents a novel hybrid deep learning approach integrating Convolutional Neural Networks (CNN) with Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) architectures to effectively detect and mitigate flooding attacks in MANETs.
View Article and Find Full Text PDFNat Commun
December 2024
Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA.
Millimeter-wave and terahertz integrated circuits and chips are expected to serve as the backbone for future wireless networks and high resolution sensing. However, design of these integrated circuits and chips can be quite complex, requiring years of human expertise, careful tailoring of hand crafted circuit topologies and co-design with parameterized and pre-selected templates of electromagnetic structures. These structures (radiative and non-radiative, single-port and multi-ports) are subsequently optimized through ad-hoc methods and parameter sweeps.
View Article and Find Full Text PDFSensors (Basel)
November 2024
Computer Engineering Department, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia.
After natural disasters such as earthquakes, floods, or wars occur, cellular communication networks often sustain significant damage or become impaired. In these critical situations, first responders must coordinate with other rescue teams to communicate essential information to central command and survivors. To address this challenge, we have developed a reliable and rapidly deployable wireless ad hoc system for post-disaster management using Data Distribution Service (DDS) middleware, specifically RTI-DDS, named R-RDSP.
View Article and Find Full Text PDFSci Rep
November 2024
Department of Computer Science, Applied College, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia.
Motivated by the pivotal role of routing in Wireless Sensor Networks (WSNs) and the prevalent security vulnerabilities arising from existing protocols, this research tackles the inherent challenges of securing WSNs. Many current WSN routing protocols prioritize computational efficiency but lack robust security measures, making them susceptible to exploitation by malicious actors. The prevalence of reactive protocols, chosen for their lower bandwidth consumption, exacerbates security concerns, as proactive alternatives require more resources for maintaining network routes.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!