Results 41 to 50 of about 34,951 (148)
Encrypted Network Traffic Classification Using Deep and Parallel Network-in-Network Models
Network traffic classification aims to recognize different application or traffic types by analyzing received data packets. This paper presents a neural network model with deep and parallel network-in-network (NIN) structures for classifying encrypted ...
Zhiyong Bu +4 more
doaj +1 more source
SAFM: An Adaptive Socially Aware Feedback Mechanism in Delay Tolerant Sensor Networks
In Delay Tolerant Sensor Networks (DTSN), it is a challenge to ensure the delivery reliability, due to the lack of end-to-end path, intermittent connection, and high latency.
Yan Liu +4 more
doaj +1 more source
Wireless sensor networking technology has been used extensively by both commercial and military applications for sensing and data collection purposes. The self-configuring, self-healing nature and the ease of deployment of these networks make them an attractive option to other centralized approaches. Most of the existing networking solutions for sensor
openaire +3 more sources
A weighted frequent itemset mining algorithm for intelligent decision in smart systems
Intelligent decision is the key technology of smart systems. Data mining technology has been playing an increasingly important role in decision-making activities.
Xuejian Zhao +4 more
doaj +1 more source
Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks
Physical layer security and full duplex have been two widely applied techniques in wireless communications community, where the physical layer security can prevent eavesdropping without the upper layer data encryption, while the full duplex can improve ...
Feng Tian +6 more
doaj +1 more source
The traditional multiview distributed video coding scheme using regional unified coding may lead to distortion problem of decoding estimation of the intense motion region. This paper presents a novel multiview distributed video coding algorithm.
Fu Xiao +3 more
doaj +1 more source
This paper investigates the energy efficiency (EE) maximization problem with secrecy constraints for a multi-user underlay cognitive radio network (CRN), where each single-antenna cognitive user is surrounded by a multi-antenna eavesdropper user ...
Pu Chen +3 more
doaj +1 more source
Fair Downlink Traffic Management for Hybrid LAA-LTE/Wi-Fi Networks
Due to the scarcity of the licensed spectrum allocated for mobile communication systems, licensed-assisted access long-term evolution (LAA-LTE) network is recently proposed to deploy in unlicensed spectrum, which is currently occupied by different Wi-Fi ...
Yang Li +4 more
doaj +1 more source
Concurrent transmission mechanism to mitigate pan-exposed-node problems in wireless sensor networks
Power control technology is widely used in wireless sensor networks to improve network performance. The asymmetric transmission power strategy used in power control technology causes the re-emergence of hidden-node problems and more serious exposed-node ...
Xuejian Zhao +4 more
doaj +1 more source
This paper presents an opportunistic reception (OR) algorithm for energy-efficient transmission in cooperative wireless sensor networks (WSNs), where the characteristics of random linear network coding and the energy consumption property of WSNs are ...
Yulun Cheng, Longxiang Yang
doaj +1 more source

