Match!
Rafaela Villalpando-Hernandez
Monterrey Institute of Technology and Higher Education
Distributed computingNetwork packetWireless sensor networkComputer networkComputer science
10Publications
2H-index
9Citations
What is this?
Publications 14
Newest
Source
view all 5 authors...
Source
view all 6 authors...
Source
#1Jaime Zuniga-Mejia (Tec: Monterrey Institute of Technology and Higher Education)
#2Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 2
Last. Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 9
view all 3 authors...
Data routing is one of the most essential functions having a direct impact on network performance. Due to the lack of any fixed infrastructure, data routing must be achieved through collaboration of nodes in Reconfigurable Wireless Networks (RWN). This implies that a malicious node can participate in the routing process and launch an attack to gain control over data traffic. Intrusion Detection Systems (IDS) are typically used to recognize malicious activities. Any IDS for routing attack-detecti...
Source
Last. Mort Naraghi-PourH-Index: 16
view all 3 authors...
Source
#1Mahdi ZareeiH-Index: 9
Last. Ehab Mahmoud MohamedH-Index: 9
view all 7 authors...
Fast development in hardware miniaturization and massive production of sensors make them cost efficient and vastly available to be used in various applications in our daily life more specially in environment monitoring applications. However, energy consumption is still one of the barriers slowing down the development of several applications. Slow development in battery technology, makes energy harvesting (EH) as a prime candidate to eliminate the sensor’s energy barrier. EH sensors can be the so...
Source
#1Jaime Zuniga-Mejia (Tec: Monterrey Institute of Technology and Higher Education)
#2Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 2
Last. Andreas Spanias (ASU: Arizona State University)H-Index: 28
view all 4 authors...
Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable netw...
Source
#1Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 9
#2Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 2
Last. Jose V. Cuan (Tec: Monterrey Institute of Technology and Higher Education)
view all 3 authors...
In wireless communication systems, it is important to have estimates of the channel in order to achieve high data rates and deliver services with the quality expected by the users. There are several channel estimation techniques used in OFDM systems, some of them based on training sequences and others on blind estimation techniques. In this paper we introduce a data aided channel estimation technique using the Vandermonde Matrix (VM)for the estimation and an interpolation through Frequency Domai...
Source
#1Mahdi Zareei (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 9
#2Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 9
Last. Mubashir Husain Rehmani (WIT: Waterford Institute of Technology)H-Index: 23
view all 6 authors...
The design of routing protocols for wireless sensor networks (WSNs) has been traditionally tackled by assuming battery-powered sensors, in which minimizing the power consumption was the main objective. Advances in technology and the ability to harvest energy from the environment has enabled self-sustaining systems and thus diminish the significance of network lifetime considerations in the design of WSNs. Although WSNs operated by energy-harvesting sensors are not limited by network lifetime, th...
3 CitationsSource
Source
12