Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm [PDF]
Wireless Sensor Networks are formed by tiny, self-contained, battery-powered computers with radio links that can sense their surroundings for events of interest and store and process the sensed data. Sensor nodes wirelessly communicate with each other to
Abdulla Juwaied +2 more
doaj +2 more sources
IoT Short-range Network protocols: Analytical study and operating models [PDF]
Internet of Things (IoT) is a constantly evolving concept. Nonetheless, we can consider that the Internet of Things broadly refers to the trend towards generalized interconnection of all the objects that surround our daily lives, places and physical ...
Sakina Elhadi +2 more
doaj +1 more source
An Improved Agent-Based AODV Routing Protocol for MANET [PDF]
The mobile ad-hoc network (MANET) is a special mobile network that has self-configuration and self-establish abilities to communicate conveniently. MANET is forming mobile devices such as mobile phones, personal digital assistants (PDAs), laptops, etc.
Van-Hau Nguyen, Vi Nam, Dao Linh, Vu Quy
doaj +1 more source
A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry
The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production
Muhammad Shoaib Farooq +8 more
doaj +1 more source
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents
Critical infrastructures and industrial organizations aggressively move towards integrating elements of modern Information Technology (IT) into their monolithic Operational Technology (OT) architectures.
Georgios Michail Makrakis +4 more
doaj +1 more source
PACKET RESERVATIONS IN REAL-TIME MULTIPATH TRANSMISSIONS I.I. Noskov [PDF]
Subject of Research. The paper presents research of mechanisms of multipath redundant transmissions in computer networks. Method. The developed application level protocol gives the possibility to increase the probability of timely and faultless data ...
Ilya I. Noskov
doaj +1 more source
Information Hiding Techniques Using Network Protocols [PDF]
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj +1 more source
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
Given the growth in computer networks and Internet usage, the traditional network environment has evolved into a more intricate system. Many applications utilize unknown communication protocols, for which the specification documentation is not available.
Javad Garshasbi, Mehdi Teimouri
doaj +1 more source
Enhanced Logical Representations of a Real Network Based on an Algebraic Model
The algebraic model and logical representations of a real network are important but very challenging issues in automatic network verification. In this paper, we abstract the concrete network to its corresponding abstract graph with enhanced vertices and ...
Yi Pan, Suixiang Gao, Wenguo Yang
doaj +1 more source
Protocols for Packet Quantum Network Intercommunication
A quantum network, which involves multiple parties pinging each other with quantum messages, could revolutionize communication, computing, and basic sciences.
Nengkun Yu, Ching-Yi Lai, Li Zhou
doaj +1 more source

