Results 31 to 40 of about 1,081,155 (378)
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj +1 more source
QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra+4 more
doaj +1 more source
QoS in Wireless Sensor Networks [PDF]
The last decades have witnessed advances in multiple wireless sensor networks in both the academic and industrial world. [...]
openaire +4 more sources
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network [PDF]
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the lifetime of both the nodes and the network.
Dananjayan, P., Valli, R.
core +1 more source
Outlier Detection Techniques For Wireless Sensor Networks: A Survey [PDF]
In the field of wireless sensor networks, measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network.
Havinga, P.J.M.+2 more
core +12 more sources
An Improved Intrusion Detection Algorithm Based on GA and SVM
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj +1 more source
Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang+4 more
doaj +1 more source
HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua+4 more
doaj +1 more source
An Enhanced PSO-Based Clustering Energy Optimization Algorithm for Wireless Sensor Network
Wireless Sensor Network (WSN) is a network which formed with a maximum number of sensor nodes which are positioned in an application environment to monitor the physical entities in a target area, for example, temperature monitoring environment, water ...
C. Vimalarani+2 more
semanticscholar +1 more source
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo+4 more
doaj +1 more source