Results 11 to 20 of about 34,951 (148)
Digital signature scheme for information non-repudiation in blockchain: a state of the art review
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security ...
Weidong Fang +5 more
doaj +1 more source
In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected performance.
J. Portilla +6 more
+7 more sources
A Novel Dynamic Spectrum-Sharing Method for GEO and LEO Satellite Networks
In this article, we investigate the spectrum-sharing for a space information network comprised of a geostationary orbit (GEO) satellite and a pair of low earth orbit (LEO) satellites, where one spectrum-sensing LEO (SLEO) is used to sense the status of ...
Yunfeng Wang +2 more
doaj +1 more source
Analyze UCA Based OAM Communication From Spatial Correlation
Orbital Angular Momentum(OAM) of Electromagnetic(EM) wave can be seen as a new degree of freedom(DoF) for wireless communication besides time and frequency. Uniform Circular Antenna Array(UCA) fed with signal of equal amplitude and equal phase difference
Wei Yu +3 more
doaj +1 more source
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo +4 more
doaj +1 more source
A system called WiSDP, which is based on Wi‐Fi signals, to detect whether a Seated Dumbbell Press action is standard by using inexpensive consumer Wi‐Fi devices is proposed. Compared with the scheme based on high speed cameras and wearable sensors, Wi‐Fi
Yuxi Qin +4 more
doaj +1 more source
Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang +4 more
doaj +1 more source
HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua +4 more
doaj +1 more source
QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra +4 more
doaj +1 more source
An Improved Intrusion Detection Algorithm Based on GA and SVM
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj +1 more source

