Results 31 to 40 of about 1,081,155 (378)

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks

open access: yesIntelligent and Converged Networks, 2021
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra   +4 more
doaj   +1 more source

QoS in Wireless Sensor Networks [PDF]

open access: yesSensors, 2018
The last decades have witnessed advances in multiple wireless sensor networks in both the academic and industrial world. [...]
openaire   +4 more sources

A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network [PDF]

open access: yes, 2010
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the lifetime of both the nodes and the network.
Dananjayan, P., Valli, R.
core   +1 more source

Outlier Detection Techniques For Wireless Sensor Networks: A Survey [PDF]

open access: yes, 2008
In the field of wireless sensor networks, measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network.
Havinga, P.J.M.   +2 more
core   +12 more sources

An Improved Intrusion Detection Algorithm Based on GA and SVM

open access: yesIEEE Access, 2018
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj   +1 more source

Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern

open access: yesInternational Journal of Distributed Sensor Networks, 2012
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang   +4 more
doaj   +1 more source

HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things

open access: yesIEEE Access, 2019
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua   +4 more
doaj   +1 more source

An Enhanced PSO-Based Clustering Energy Optimization Algorithm for Wireless Sensor Network

open access: yesTheScientificWorldJournal, 2016
Wireless Sensor Network (WSN) is a network which formed with a maximum number of sensor nodes which are positioned in an application environment to monitor the physical entities in a target area, for example, temperature monitoring environment, water ...
C. Vimalarani   +2 more
semanticscholar   +1 more source

Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks

open access: yesIEEE Access, 2017
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy