Results 21 to 30 of about 34,951 (148)

Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
In the study of three-dimensional underwater sensor networks, the nodes would produce changes in perception range under the influence of environmental factors and their own hardware. Requesting all nodes completely isomorphic is unrealistic.
Junjie Huang   +5 more
doaj   +1 more source

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

Wireless sensor networks [PDF]

open access: yesIEEE Wireless Communications, 2004
Havinga, Paul J.M.   +2 more
  +5 more sources

Improved Virtual Potential Field Algorithm Based on Probability Model in Three-Dimensional Directional Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2012
In conventional directional sensor networks, coverage control for each sensor is based on a 2D directional sensing model. However, 2D directional sensing model failed to accurately characterize the actual application scene of image/video sensor networks.
Junjie Huang   +3 more
doaj   +1 more source

A Detection Method for Anomaly Flow in Software Defined Network

open access: yesIEEE Access, 2018
As a new type of network structure, the Software Defined Network (SDN) provides a new solution for network flow management and optimization, which has made the accurate detection of anomaly SDN flows a hot research topic. This paper presents an SDN-based
Huijun Peng   +4 more
doaj   +1 more source

Online Spectrum Prediction With Adaptive Threshold Quantization

open access: yesIEEE Access, 2019
In this paper, we explore the spectrum inference to achieve the spectrum occupancy in advance through analyzing the historical spectrum. We have conceived an offline-online cooperative framework.
Haoyu Li   +4 more
doaj   +1 more source

Type-2 Fuzzy Sliding Mode Anti-Swing Controller Design and Optimization for Overhead Crane

open access: yesIEEE Access, 2018
Overhead crane is regarded as a kind of complex nonlinear dynamic system in which the underactuated characteristic makes the controller hardly control the space of load swing effectively.
Zhe Sun   +5 more
doaj   +1 more source

Deep Learning-Based Unmanned Surveillance Systems for Observing Water Levels

open access: yesIEEE Access, 2018
Traditional surveillance systems for observing water levels are often complex, costly, and time-consuming. In this paper, we developed a low-cost unmanned surveillance system consisting of remote measuring stations and a monitoring center.
Jinqiu Pan   +5 more
doaj   +1 more source

Waypoint segment routing algorithm for LEO satellite network

open access: yesIET Communications, 2022
Satellite communication, especially low earth orbit satellites, an important part of the space‐air‐ground integrated network, is a promising solution to support global coverage and reliable communication.
Rui Chen   +3 more
doaj   +1 more source

Gated Spatial–Temporal Merged Transformer Inspired by Multimask and Dual Branch for Traffic Forecasting

open access: yesIET Signal Processing
As an essential part of intelligent transportation system (ITS), traffic forecasting has provided crucial role for traffic management and risk assessment.
Yongpeng Yang, Zhenzhen Yang, Zhen Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy