|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|
|
|
|
Enrico Ferrari, Damiano Verda, Nicolò Pinna and Marco Muselli
Optimizing water distribution both from an energy-saving perspective and from a quality of service perspective is a challenging task since it involves a complex system with many nodes, many hidden variables and many operational constraints. For this reas...
ver más
|
|
|
|
|
|
|
Md. Rashadur Rahman, Mohammad Shamsul Arefin, Sanjida Rahman, Afsana Ahmed, Tahsina Islam, Pranab Kumar Dhar and Oh-Jin Kwon
Recent advancements in high-speed communications and high-capacity computing systems have contributed to major growth in the data volume of databases. Data mining is a crucial part of information retrieval; it is often termed as database knowledge discov...
ver más
|
|
|
|
|
|
|
Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Olukayode Karunwi, Yongsung Kim, Cheng-Chi Lee and Chun-Ta Li
Modern cellular communication networks are already being perturbed by large and steadily increasing mobile subscribers in high demand for better service quality. To constantly and reliably deploy and optimally manage such mobile cellular networks, the ra...
ver más
|
|
|
|
|
|
|
Ahmed Latif Yaser, Hamdy M. Mousa and Mahmoud Hussein
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network?s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solut...
ver más
|
|
|
|
|
|
|
Yusuf Abdulwahab Hassan, Anuruddha Kankanamge
Pág. 1 - 17
Many studies that investigates growth and energy consumption relation uses cross country pooled data and ends with contradictory results which is still debatable and inconclusive. Such outcome is obvious due to country wide heterogeneous nature in ...
ver más
|
|
|
|
|
|
|
Vincenza Carchiolo, Marco Grassia, Alessandro Longheu, Michele Malgeri and Giuseppe Mangioni
The provision of wellness in workplaces gained interest in recent decades. A factor that contributes significantly to workers? health is their diet, especially when provided by canteen services. The assessment of such a service involves questions as food...
ver más
|
|
|
|
|
|
|
Nikita Nazarov
Pág. 91 - 97
The subject of study in the article is the process of socio-economic conflict management. The purpose of the work is to substantiate the theoretical provisions and methodological approaches in the management of labor conflicts as a form of social and lab...
ver más
|
|
|
|
|
|
|
Tian Xia and Xuemin Chen
Many machine learning methods have been applied for short messaging service (SMS) spam detection, including traditional methods such as naïve Bayes (NB), vector space model (VSM), and support vector machine (SVM), and novel methods such as long short-ter...
ver más
|
|
|
|
|
|
|
Tanweer Alam
Pág. 18 - 26
Background: The wireless networks make it easier for users to connect with each other in the sense of the Internet of Things (IoT) system. The cloud and MANET convergence offer the services for cloud access within MANET of devices connected.Objective: Th...
ver más
|
|
|
|