Results 91 to 100 of about 1,765,999 (278)
A feature selection method of network traffic based on statistic and ranking strategy
It is required to select the best features from so many ones in order to avoid the high complexity of the model, the low classification accuracy and efficiency caused by redundant and irrelevant features, if network traffic classification is obtained by ...
Liu Jiwei, Zhao Yuexian, Zhao Yang
doaj +1 more source
Efficient Wireless Security Through Jamming, Coding and Routing
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa +3 more
core +1 more source
ABSTRACT Breathable membranes that reject chemical warfare agents (CWAs) are required for next‐generation protective apparel. A dual‐function graphene oxide (GO)‐polyamine architecture is introduced that addresses the long‐standing tradeoff between vapor transmission and CWA selectivity.
Hyungjun Kim +6 more
wiley +1 more source
Application-centric congestion control
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer +3 more
doaj +1 more source
Reprogrammable multi‐material smart textiles knitted from liquid crystal elastomer fibers undergo 2D and 3D deformation under thermal and photo stimuli. Circularly knitted tubular structures reversibly contract in radial and axial directions, enabling autonomous climbing, liquid release, and micro pumping.
Xue Wan +8 more
wiley +1 more source
Trust Modeling in Wireless Sensor Networks: State of the Art
Wireless sensor networks (WSNs) is the backbone of the new generation of internet of things (IoT). WSNs are growing rapidly and security threats are increasingly growing as well. Trust computing plays a crucial role in WSN security modeling.
Mohammed Mahdi AlQahatani +1 more
doaj +1 more source
On the security of software-defined next-generation cellular networks [PDF]
In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software ...
Alzahrani, Bander +3 more
core
We present ultrathin flexible transparent electrodes through iCVD‐enabled molecular control of 10 nm gold films on poly(dimethylaminomethylstyrene). In vivo validation demonstrated photoelectric artifact reduction vs. opaque electrodes and preservation of natural neural dynamics.
Tae Jin Mun +11 more
wiley +1 more source
The Challenges in SDN/ML Based Network Security : A Survey
Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge.
Nguyen, Tam N.
core +1 more source

