Browsing by Subject "Directive antennas"
Now showing items 1-6 of 6
-
Article
Bandwidth and Directivity Enhancement of Loop Antenna by Nonperiodic Distribution of Mu-Negative Metamaterial Unit Cells
(2016)The theory, design, analysis, and verification of a wideband and unidirectional loop antenna loaded with mu-negative (MNG) metamaterial unit cells is presented. It is shown that by nonperiodic positioning of MNG unit cells ...
-
Conference Object
Combating persistent adversaries in wireless sensor networks using directional antennas
(2011)Security is an important property in applications offering services in mission-critical areas, such as in healthcare, military, transportation, etc. Wireless sensor networks (WSN) support the mission of these applications ...
-
Article
Gain Enhancement of Wideband Metamaterial-Loaded Loop Antenna with Tightly Coupled Arc-Shaped Directors
(2017)A wideband and unidirectional loop antenna with enhanced and stable gain is presented. To reduce the size of the antenna, the loop is loaded with three mu-negative (MNG) metamaterial unit-cells. The proposed unit-cells ...
-
Article
Miniaturization of Planar Yagi Antennas Using Mu-Negative Metamaterial-Loaded Reflector
(2017)A technique to reduce the size and enhance the operating bandwidth (BW) of planar Yagi antennas, while maintaining their unidirectional radiation characteristics, is proposed in this paper. In this technique, the reflector ...
-
Article
Miniaturized Planar Yagi Antenna Utilizing Capacitively Coupled Folded Reflector
(2017)The analysis and design of a unidirectional and wideband printed Yagi antenna with miniaturized size using a capacitively coupled reflector is presented. Reflectors have been widely used for canceling back radiation of ...
-
Conference Object
Recovering from the selective forwarding attack in WSNs - Enhancing the recovery benefits of blacklisting and rerouting using directional antennas
(Institute of Electrical and Electronics Engineers Inc., 2014)Wireless sensor networks (WSNs) face a number of security challenges that can compromise their operation. A typical security attack that can be launched by an adversary, in order to affect the network's communication, is ...