|
|
|
Jifeng Zhu, Xiaohe Pan, Zheng Peng, Mengzhuo Liu, Jingqian Guo and Jun-Hong Cui
The establishment of the Underwater Internet of Things (UIoT) and the realization of interconnection between heterogeneous underwater intelligent devices are urgent global challenges. Underwater acoustic networking is the most suitable technology to achi...
ver más
|
|
|
|
|
|
|
Valeriy Ivanov and Maxim Tereshonok
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear deline...
ver más
|
|
|
|
|
|
|
Marco Leo, Pierluigi Carcagnì, Luca Signore, Francesco Corcione, Giulio Benincasa, Mikko O. Laukkanen and Cosimo Distante
Colorectal cancer is one of the most lethal cancers because of late diagnosis and challenges in the selection of therapy options. The histopathological diagnosis of colon adenocarcinoma is hindered by poor reproducibility and a lack of standard examinati...
ver más
|
|
|
|
|
|
|
Georgios M. Nikolopoulos and Marc Fischlin
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used...
ver más
|
|
|
|
|
|
|
Mihai Petru Stef and Zsolt Alfred Polgar
With the constant growth of software-defined radio (SDR) technologies in fields related to wireless communications, the need for efficient ways of testing and evaluating the physical-layer (PHY) protocols developed for these technologies in real-life tra...
ver más
|
|
|
|
|
|
|
Ayman Khalil and Besma Zeddini
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Jihong Wang, Zhuo Wang and Lidong Zhang
Clustering protocols and simultaneous wireless information and power transfer (SWIPT) technology can solve the issue of imbalanced energy consumption among nodes in energy harvesting-cognitive radio sensor networks (EH-CRSNs). However, dynamic energy cha...
ver más
|
|
|
|
|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Jifeng Zhu, Xiaohe Pan, Zheng Peng, Mengzhuo Liu, Jingqian Guo, Tong Zhang, Yu Gou and Jun-Hong Cui
The most significant increase of current task is in the desire for operational flexibility and agility in large-scale underwater network application scenarios in recent years. In order to address the challenging problems in Underwater Wireless Sensor Net...
ver más
|
|
|
|