Results 31 to 40 of about 2,283,438 (277)

Low Complexity HEVC Encoder for Visual Sensor Networks

open access: yesSensors, 2015
Visual sensor networks (VSNs) can be widely applied in security surveillance, environmental monitoring, smart rooms, etc. However, with the increased number of camera nodes in VSNs, the volume of the visual information data increases significantly, which
Zhaoqing Pan, Liming Chen, Xingming Sun
doaj   +1 more source

Monitoring within an Autonomic Network: A GANA Based Network Monitoring Framework [PDF]

open access: yes, 2010
The concept of self-managing of autonomic networks is a paradigm shift from today's management models, aiming at enabling networked nodes to self manage their behaviour within the constrains of the operator's policies and objectives. In this article, we present our approach for self-coordinating monitoring functions within such an autonomic network ...
Zafeiropoulos A.   +3 more
openaire   +1 more source

Compressed Network Monitoring [PDF]

open access: yes2007 IEEE/SP 14th Workshop on Statistical Signal Processing, 2007
This paper describes a procedure for estimating a full set of network path metrics, such as loss or delay, from a limited number of measurements. The approach exploits the strong spatial and temporal correlation observed in path-level metric data, which arises due to shared links and stationary components of the observed phenomena.
Mark Coates   +2 more
openaire   +1 more source

Urban Functional Area Division Based on Cell Tower Classification

open access: yesIEEE Access, 2019
Each city can be divided into different functional areas for different purposes, such as commercial areas, residential areas, leisure areas, office areas, etc.
Yuewei Wu, Yuanyuan Qiao, Jie Yang
doaj   +1 more source

Environmental and Anthropogenic Factors Shape Major Bacterial Community Types Across the Complex Mountain Landscape of Switzerland

open access: yesFrontiers in Microbiology, 2021
Mountain areas harbor large climatic and geographic gradients and form numerous habitats that promote high overall biodiversity. Compared to macroorganisms, knowledge about drivers of biodiversity and distribution of soil bacteria in mountain regions is ...
Johanna Mayerhofer   +6 more
doaj   +1 more source

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +1 more source

A Wireless Sensor Network for Cold-Chain Monitoring [PDF]

open access: yes, 2009
This paper deals with a wireless sensor network that was specifically designed to monitor temperature-sensitive products during their distribution with the aim of conforming to the cold-chain assurance requirements.
Carullo, Alessio   +3 more
core   +1 more source

DNS Over HTTPS Detection Using Standard Flow Telemetry

open access: yesIEEE Access, 2023
The aim of DNS over HTTPS (DoH) is to enhance users’ privacy by encrypting DNS. However, it also enables adversaries to bypass security mechanisms that rely on inspecting unencrypted DNS.
Kamil Jerabek   +3 more
doaj   +1 more source

Survival for Children Diagnosed With Wilms Tumour (2012–2022) Registered in the UK and Ireland Improving Population Outcomes for Renal Tumours of Childhood (IMPORT) Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga   +56 more
wiley   +1 more source

Web-based Network Monitoring Tools Using SNMP Protocol and SMS Notification

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
Device monitoring tool on a computer network is required by the administrator to perform management of the device. This research produces web applications using PHP that is capable of monitoring and collecting device information on the network.
Shofa Taftazanie   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy