Results 31 to 40 of about 6,552,120 (397)

Network Packet Classification using Neural Network based on Training Function and Hidden Layer Neuron Number Variation

open access: yes, 2017
Distributed denial of service (DDoS) is a structured network attack coming from various sources and fused to form a large packet stream. DDoS packet stream pattern behaves as normal packet stream pattern and very difficult to distinguish between DDoS and
I. Riadi, A. Muhammad, Sunardi
semanticscholar   +1 more source

SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey

open access: yesIEEE Communications Surveys and Tutorials, 2017
The emergence of two new technologies, namely, software defined networking (SDN) and network function virtualization (NFV), have radically changed the development of network functions and the evolution of network architectures.
Van-Giang Nguyen   +3 more
semanticscholar   +1 more source

Network-Coded Multiple Access [PDF]

open access: yes, 2013
This paper proposes and experimentally demonstrates a first wireless local area network (WLAN) system that jointly exploits physical-layer network coding (PNC) and multiuser decoding (MUD) to boost system throughput. We refer to this multiple access mode
Lizhao You   +3 more
core   +2 more sources

Probabilistic Forwarding of Coded Packets on Networks [PDF]

open access: yes2019 IEEE International Symposium on Information Theory (ISIT), 2019
submitted to the IEEE/ACM Transactions on Netowrking. further extension of arxiv:1901.07498. (14 pages)
B. R. Vinay Kumar, Navin Kashyap
openaire   +5 more sources

Model for speech signal quality estimation in packet network of electricity supply industry [PDF]

open access: yesSerbian Journal of Electrical Engineering, 2019
In this paper we present the dilemma dealing with the choice of speech segment duration and the calculation of speech signal quality in the packet telephone network of Electricity supply industry (ESI).
Lebl Aleksandar   +3 more
doaj   +1 more source

Carrier Sense Random Packet CDMA Protocol in Dual-Channel Networks [PDF]

open access: yes, 2015
Code resource wastage is caused by the reason that many hopping frequency (FH) sequences are unused, which occurs under the condition that the number of the actual subnets needed for the tactical network is far smaller than the networking capacity of ...
Cui, P.   +5 more
core   +2 more sources

Dynamic homeostasis in packet switching networks [PDF]

open access: yesAdaptive Behavior, 2014
In this study, we investigate the adaptation and robustness of a packet switching network (PSN), the fundamental architecture of the Internet. We claim that the adaptation introduced by a transmission control protocol congestion control mechanism is interpretable as the self-organization of complex itinerant behavior among many quasi-attracting states.
Mizuki Oka   +2 more
openaire   +3 more sources

Sistem Komunikasi Modul Sensor Jamak Berbasiskan Mikrokontroler Menggunakan Serial Rs-485 Mode Multi Processor Communication (Mpc)

open access: yesLontar Komputer, 2016
Multi-sensor communication system uses RS-485 standard communication connecting each microcontroller-based data processing unit to form BUS topology network. The advantages of this  communication system  are:  connectivity  (easy  to  connecting  devices
Suar wibawa   +2 more
doaj   +1 more source

Intelligent Packet Priority Module for a Network of Unmanned Aerial Vehicles Using Manhattan Long Short-Term Memory

open access: yesDrones
Unmanned aerial vehicles (UAVs) are becoming more common in wireless communication networks. Using UAVs can lead to network problems. An issue arises when the UAVs function in a network-access-limited environment with nodes causing interference.
Dino Budi Prakoso   +4 more
doaj   +1 more source

Orion Routing Protocol for Delay-Tolerant Networks [PDF]

open access: yes, 2011
In this paper, we address the problem of efficient routing in delay tolerant network. We propose a new routing protocol dubbed as ORION. In ORION, only a single copy of a data packet is kept in the network and transmitted, contact by contact, towards the
Ahmed, Toufik, Medjiah, Samir
core   +6 more sources

Home - About - Disclaimer - Privacy