Results 51 to 60 of about 1,290,040 (147)

Universal and Robust Distributed Network Codes

open access: yes, 2010
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented over finite fields whose size depends on some global network parameters (size of the ...
Ho, Tracey   +3 more
core   +1 more source

Internet of things security implementation using blockchain for wireless technology [PDF]

open access: yes, 2019
Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code.
Karim, Karim Jabur
core   +1 more source

Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications

open access: yes, 2017
In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying.
Brown, André EX   +11 more
core   +4 more sources

An Energy Balance Clustering Routing Protocol for Intra-Body Wireless Nanosensor Networks

open access: yesSensors, 2019
Wireless NanoSensor Networks (WNSNs) are a new type of network that combines nanotechnology and sensor networks. Because WNSNs have great application prospects in intra-body health monitoring, biomedicine and damage detection, intra-body Wireless ...
Juan Xu   +3 more
doaj   +1 more source

Models and Performance of VANET based Emergency Braking [PDF]

open access: yes, 2011
The network research community is working in the field of automotive to provide VANET based safety applications to reduce the number of accidents, deaths, injuries and loss of money.
Lo Cigno, Renato, Segata, Michele
core  

Modelling of SDN switch with OpenFlow protocol in AnyLogic

open access: yesИзвестия высших учебных заведений. Поволжский регион:Технические науки
Background. Low flexibility and manageability of software control of network equipment is one of the problems of modern networks. In order to solve this problem, software- defined networks (SDN) are used, the main component of which is switch with ...
I.A. Filippov   +3 more
doaj   +1 more source

Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression

open access: yesJournal of Computer Networks and Communications, 2014
Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms ...
Divya Selvaraj, Padmavathi Ganapathi
doaj   +1 more source

Sistem Autentikasi Hotspot Menggunakan LDAP dan Radius pada Jaringan Internet Wireless Prodi Teknik Sistem Komputer

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
Wireless network is a network utilizing radio waves that propagate openly. This network requires security to simplify the process by using user Authentication.
Ahmad Herdinal Muttaqin   +2 more
doaj   +1 more source

Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

open access: yesAerospace, 2015
An unmanned aerial ad hoc network (UAANET) is a special type of mobile ad hoc network (MANET). For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols.
Jean-Daniel Medjo Me Biomo   +3 more
doaj   +1 more source

Using Apriori algorithm to prevent black hole attack in mobile Ad hoc networks [PDF]

open access: yesManagement Science Letters, 2013
A mobile ad hoc network (MANET) is considered as an autonomous network, which consists of mobile nodes, which communicate with each other over wireless links.
Seyed Javad Mirabedini   +2 more
doaj  

Home - About - Disclaimer - Privacy