Results 11 to 20 of about 353,955 (333)

Stochastic user behaviour modelling and network simulation for resource management in cooperation with mobile telecommunications and broadcast networks [PDF]

open access: yes, 2006
The latest generations of telecommunications networks have been designed to deliver higher data rates than widely used second generation telecommunications networks, providing flexible communication capabilities that can deliver high quality video images.
Centonza, A   +5 more
core   +1 more source

NSE-RRS: Network Slicing Embedding With Risk-Controlled Resource Sharing

open access: yesIEEE Access, 2021
Network slicing (NS) is a promising technology of 5G that provides end-to-end customized network service to multi-tenant. The network slicing embedding (NSE) problem is one of the essential issues in NS technology.
Jieyu Li   +3 more
doaj   +1 more source

A Real-Time Hidden Anomaly Detection of Correlated Data in Wireless Networks

open access: yesIEEE Access, 2020
Wireless networks have been generating a plethora of unstructured and highly-correlated big data with hidden anomalies. The anomalies may bring inaccurate predictions of network behaviors, which further lead to inefficient system designs such as ...
Tengfei Sui   +6 more
doaj   +1 more source

A Scalable Parallel Architecture Based on Many-Core Processors for Generating HTTP Traffic

open access: yesApplied Sciences, 2017
The past years have witnessed the significant development of the Internet. Numerous emerging network architectures and protocols have triggered the demand for traffic generators which stand in stark contrast to previous schemes.
Xinheng Wang   +5 more
doaj   +1 more source

A Security Management Architecture for Time Synchronization Towards High Precision Networks

open access: yesIEEE Access, 2021
Time synchronization is quickly becoming a fundamental prerequisite for a smart society. With the development of the fifth-generation (5G) network, time-sensitive networking (TSN), and the rise of high-precision networks, its accurate and reliable ...
Hongxing Li   +5 more
doaj   +1 more source

Coverage Extension of Indoor 5G Network Using RoF-Based Distributed Antenna System

open access: yesIEEE Access, 2020
We propose and demonstrate a cascaded distributed antenna system (DAS) for efficiently extending the coverage of the mmWave-based 5G indoor network. For this, we exploit the radio-over-fiber (RoF) system based on the intermediate-frequency-over-fiber ...
Eon-Sang Kim   +5 more
doaj   +1 more source

Overview of prefetching technology in content deliver networks

open access: yesDianzi Jishu Yingyong, 2019
Content Delivery Network(CDN) has recently become one of the most popular research fields. To reduce the user access latency and improve the quality of service the network, the content prefetching technology is introduced based on the CDN cache ...
Wang Shuping   +4 more
doaj   +1 more source

Survivability in hierarchical telecommunications networks [PDF]

open access: yesNetworks, 2011
AbstractThe survivable hierarchical telecommunications network design problem consists of locating concentrators, assigning user nodes to concentrators, and linking concentrators in a reliable backbone network. In this article, we study this problem when the backbone is 2‐edge connected and when user nodes are linked to concentrators by a point‐to ...
Fouilhoux, Pierre   +4 more
openaire   +6 more sources

Dualattn-GAN: Text to Image Synthesis With Dual Attentional Generative Adversarial Network

open access: yesIEEE Access, 2019
Recent generative adversarial network based methods have shown promising results for the charming but challenging task of synthesizing images from text descriptions.
Yali Cai   +6 more
doaj   +1 more source

Audio recognition of Chinese traditional instruments based on machine learning

open access: yesCognitive Computation and Systems, 2022
This paper is part of a special issue on Music Technology. We study the type recognition of traditional Chinese musical instrument audio in the common way. Using MEL spectrum characteristics as input, we train an 8‐layer convolutional neural network, and
Rongfeng Li, Qin Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy