Results 51 to 60 of about 1,290,040 (147)
Universal and Robust Distributed Network Codes
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented over finite fields whose size depends on some global network parameters (size of the ...
Ho, Tracey +3 more
core +1 more source
Internet of things security implementation using blockchain for wireless technology [PDF]
Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code.
Karim, Karim Jabur
core +1 more source
Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications
In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying.
Brown, André EX +11 more
core +4 more sources
An Energy Balance Clustering Routing Protocol for Intra-Body Wireless Nanosensor Networks
Wireless NanoSensor Networks (WNSNs) are a new type of network that combines nanotechnology and sensor networks. Because WNSNs have great application prospects in intra-body health monitoring, biomedicine and damage detection, intra-body Wireless ...
Juan Xu +3 more
doaj +1 more source
Models and Performance of VANET based Emergency Braking [PDF]
The network research community is working in the field of automotive to provide VANET based safety applications to reduce the number of accidents, deaths, injuries and loss of money.
Lo Cigno, Renato, Segata, Michele
core
Modelling of SDN switch with OpenFlow protocol in AnyLogic
Background. Low flexibility and manageability of software control of network equipment is one of the problems of modern networks. In order to solve this problem, software- defined networks (SDN) are used, the main component of which is switch with ...
I.A. Filippov +3 more
doaj +1 more source
Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms ...
Divya Selvaraj, Padmavathi Ganapathi
doaj +1 more source
Wireless network is a network utilizing radio waves that propagate openly. This network requires security to simplify the process by using user Authentication.
Ahmad Herdinal Muttaqin +2 more
doaj +1 more source
An unmanned aerial ad hoc network (UAANET) is a special type of mobile ad hoc network (MANET). For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols.
Jean-Daniel Medjo Me Biomo +3 more
doaj +1 more source
Using Apriori algorithm to prevent black hole attack in mobile Ad hoc networks [PDF]
A mobile ad hoc network (MANET) is considered as an autonomous network, which consists of mobile nodes, which communicate with each other over wireless links.
Seyed Javad Mirabedini +2 more
doaj

