Search

Your search keyword '"IEEE 802.11ah"' showing total 20 results

Search Constraints

Start Over You searched for: Descriptor "IEEE 802.11ah" Remove constraint Descriptor: "IEEE 802.11ah" Journal sensors Remove constraint Journal: sensors
20 results on '"IEEE 802.11ah"'

Search Results

1. Deep Reinforcement Learning for Optimizing Restricted Access Window in IEEE 802.11ah MAC Layer

2. An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid

3. Genetic Algorithm-Based Grouping Strategy for IEEE 802.11ah Networks

4. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges

5. An Analytical Model for the Aggregate Throughput of IEEE 802.11ah Networks under the Restricted Access Window Mechanism

6. Selfish Behavior in IEEE 802.11ah Networks: A Detection Algorithm and Mitigation Strategies

7. Resource Allocation for Machine-Type Communication of Energy-Harvesting Devices in Wi-Fi HaLow Networks

8. Survey on Wireless Technology Trade-Offs for the Industrial Internet of Things

9. CA-CWA: Channel-Aware Contention Window Adaption in IEEE 802.11ah for Soft Real-Time Industrial Applications

10. Accurate Energy Modeling and Characterization of IEEE 802.11ah RAW and TWT

11. What Is the Fastest Way to Connect Stations to a Wi-Fi HaLow Network?

12. MFAM: Multiple Frequency Adaptive Model-Based Indoor Localization Method

13. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic

14. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

15. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah

16. Resource Allocation for Machine-Type Communication of Energy-Harvesting Devices in Wi-Fi HaLow Networks

17. Survey on Wireless Technology Trade-Offs for the Industrial Internet of Things

18. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks

19. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic

20. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

Catalog

Books, media, physical & digital resources