Results 31 to 40 of about 2,283,438 (277)
Low Complexity HEVC Encoder for Visual Sensor Networks
Visual sensor networks (VSNs) can be widely applied in security surveillance, environmental monitoring, smart rooms, etc. However, with the increased number of camera nodes in VSNs, the volume of the visual information data increases significantly, which
Zhaoqing Pan, Liming Chen, Xingming Sun
doaj +1 more source
Monitoring within an Autonomic Network: A GANA Based Network Monitoring Framework [PDF]
The concept of self-managing of autonomic networks is a paradigm shift from today's management models, aiming at enabling networked nodes to self manage their behaviour within the constrains of the operator's policies and objectives. In this article, we present our approach for self-coordinating monitoring functions within such an autonomic network ...
Zafeiropoulos A. +3 more
openaire +1 more source
Compressed Network Monitoring [PDF]
This paper describes a procedure for estimating a full set of network path metrics, such as loss or delay, from a limited number of measurements. The approach exploits the strong spatial and temporal correlation observed in path-level metric data, which arises due to shared links and stationary components of the observed phenomena.
Mark Coates +2 more
openaire +1 more source
Urban Functional Area Division Based on Cell Tower Classification
Each city can be divided into different functional areas for different purposes, such as commercial areas, residential areas, leisure areas, office areas, etc.
Yuewei Wu, Yuanyuan Qiao, Jie Yang
doaj +1 more source
Mountain areas harbor large climatic and geographic gradients and form numerous habitats that promote high overall biodiversity. Compared to macroorganisms, knowledge about drivers of biodiversity and distribution of soil bacteria in mountain regions is ...
Johanna Mayerhofer +6 more
doaj +1 more source
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou +4 more
doaj +1 more source
A Wireless Sensor Network for Cold-Chain Monitoring [PDF]
This paper deals with a wireless sensor network that was specifically designed to monitor temperature-sensitive products during their distribution with the aim of conforming to the cold-chain assurance requirements.
Carullo, Alessio +3 more
core +1 more source
DNS Over HTTPS Detection Using Standard Flow Telemetry
The aim of DNS over HTTPS (DoH) is to enhance users’ privacy by encrypting DNS. However, it also enables adversaries to bypass security mechanisms that rely on inspecting unencrypted DNS.
Kamil Jerabek +3 more
doaj +1 more source
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga +56 more
wiley +1 more source
Web-based Network Monitoring Tools Using SNMP Protocol and SMS Notification
Device monitoring tool on a computer network is required by the administrator to perform management of the device. This research produces web applications using PHP that is capable of monitoring and collecting device information on the network.
Shofa Taftazanie +2 more
doaj +1 more source

