|
|
|
L Raghavendar Raju,C R K Reddy
Pág. pp. 40 - 51
Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect...
ver más
|
|
|
|
|
|
Peijun Zou, Ming Zhao, Jia Wu and Leilei Wang
Due to the dynamic change of the opportunistic network topology and the lack of stable information transmission paths between nodes, the traditional topology-based routing algorithm cannot achieve the desired routing performance. To address of this probl...
ver más
|
|
|
|
|
|
Sana Mujeeb, Turki Ali Alghamdi, Sameeh Ullah, Aisha Fatima, Nadeem Javaid and Tanzila Saba
Recently, power systems are facing the challenges of growing power demand, depleting fossil fuel and aggravating environmental pollution (caused by carbon emission from fossil fuel based power generation). The incorporation of alternative low carbon ener...
ver más
|
|
|
|
|
|
Yiran Hao, Yiqiang Sheng and Jinlin Wang
We use the proposed packet2vec learning algorithm for IDS preprocessing, the basic steps of IDS are as follows. First, the originally collected traffic is split into packets to be truncated into fixed length. Next, the packet2vec learning algorithm is us...
ver más
|
|
|
|
|
|
Hojin Ha and Eun-Seok Ryu
This paper describes a three-screen television system using a block recovery rate (BRR)-based unequal error protection (UEP). The proposed in-home wireless network uses scalable video coding (SVC) and UEP with forward error correction (FEC) for maximizin...
ver más
|
|
|