|
|
|
Rawan Alsheikh, Etimad Fadel and Nadine Akkari
A potential application of interest involves applications that can tolerate some level of inconsistency, such as routing or load-balancing applications.
|
|
|
|
|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
Xiaonan Wang, Yang Guo and Yuan Gao
Non-terrestrial network (NTN) is a trending topic in the field of communication, as it shows promise for scenarios in which terrestrial infrastructure is unavailable. Unmanned autonomous intelligent systems (UAISs), as a physical form of artificial intel...
ver más
|
|
|
|
|
|
|
Yuzhu Zhang and Hao Xu
This study investigates the problem of decentralized dynamic resource allocation optimization for ad-hoc network communication with the support of reconfigurable intelligent surfaces (RIS), leveraging a reinforcement learning framework. In the present co...
ver más
|
|
|
|
|
|
|
N Mbuli, R Xezile, JHC Pretorius, P Sowa
Power system faults can cause voltage sags that, if they are less than voltage sensitivity threshold of equipment, can lead to interruption of supply and lead to incurring of financial losses. The impact of distributed generation (DG) on these financial ...
ver más
|
|
|
|
|
|
|
Ying-Hsun Lai, Shin-Yeh Chen, Wen-Chi Chou, Hua-Yang Hsu and Han-Chieh Chao
Federated learning trains a neural network model using the client?s data to maintain the benefits of centralized model training while maintaining their privacy. However, if the client data are not independently and identically distributed (non-IID) becau...
ver más
|
|
|
|
|
|
|
Feng Zhou, Shijing Hu, Xin Du, Xiaoli Wan and Jie Wu
In the current field of disease risk prediction research, there are many methods of using servers for centralized computing to train and infer prediction models. However, this centralized computing method increases storage space, the load on network band...
ver más
|
|
|
|
|
|
|
Mohammed Bellaj, Najib Naja and Abdellah Jamali
Named Data Networking (NDN) has emerged as a promising architecture to overcome the limitations of the conventional Internet Protocol (IP) architecture, particularly in terms of mobility, security, and data availability. However, despite the advantages i...
ver más
|
|
|
|
|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
|
Qiang Liu, Rui Han and Yang Li
Idle bandwidth resources are inefficiently distributed among different users. Currently, the utilization of user bandwidth resources mostly relies on traditional IP networks, implementing relevant techniques at the application layer, which creates scalab...
ver más
|
|
|
|