Results 31 to 40 of about 2,296,766 (196)
Compressed Network Monitoring [PDF]
This paper describes a procedure for estimating a full set of network path metrics, such as loss or delay, from a limited number of measurements. The approach exploits the strong spatial and temporal correlation observed in path-level metric data, which arises due to shared links and stationary components of the observed phenomena.
Mark Coates +2 more
openaire +1 more source
Algae are increasingly becoming the center for interest due to researchers for their composition of various important bioactive molecules. The objective of this study is to investigate the seasonal variations in the concentrations of flavonoids ...
Djazia KHERRAZ-CHEMLAL +4 more
doaj +1 more source
Whitebark pine (Pinus albicaulis) forests in the western United States have been adversely affected by an exotic pathogen (Cronartium ribicola, causal agent of white pine blister rust), insect outbreaks (Dendroctonus ponderosae, mountain pine beetle ...
Erin Shanahan +6 more
doaj +1 more source
Low Complexity HEVC Encoder for Visual Sensor Networks
Visual sensor networks (VSNs) can be widely applied in security surveillance, environmental monitoring, smart rooms, etc. However, with the increased number of camera nodes in VSNs, the volume of the visual information data increases significantly, which
Zhaoqing Pan, Liming Chen, Xingming Sun
doaj +1 more source
Urban Functional Area Division Based on Cell Tower Classification
Each city can be divided into different functional areas for different purposes, such as commercial areas, residential areas, leisure areas, office areas, etc.
Yuewei Wu, Yuanyuan Qiao, Jie Yang
doaj +1 more source
Mountain areas harbor large climatic and geographic gradients and form numerous habitats that promote high overall biodiversity. Compared to macroorganisms, knowledge about drivers of biodiversity and distribution of soil bacteria in mountain regions is ...
Johanna Mayerhofer +6 more
doaj +1 more source
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou +4 more
doaj +1 more source
DNS Over HTTPS Detection Using Standard Flow Telemetry
The aim of DNS over HTTPS (DoH) is to enhance users’ privacy by encrypting DNS. However, it also enables adversaries to bypass security mechanisms that rely on inspecting unencrypted DNS.
Kamil Jerabek +3 more
doaj +1 more source
A Wireless Sensor Network for Cold-Chain Monitoring [PDF]
This paper deals with a wireless sensor network that was specifically designed to monitor temperature-sensitive products during their distribution with the aim of conforming to the cold-chain assurance requirements.
Carullo, Alessio +3 more
core +1 more source
Web-based Network Monitoring Tools Using SNMP Protocol and SMS Notification
Device monitoring tool on a computer network is required by the administrator to perform management of the device. This research produces web applications using PHP that is capable of monitoring and collecting device information on the network.
Shofa Taftazanie +2 more
doaj +1 more source

