Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 14, Issue 12019
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1740-0562
EISSN:1740-0570
Reflects downloads up to 18 Feb 2025Bibliometrics
Skip Table Of Content Section
research-article
Coverless information hiding method based on the keyword

Information hiding is an important technique to make secure the transmission of information. However, the existing information hiding method based on text is difficult to resist various steganography detection. Coverless text information hiding, a new ...

research-article
Measurement method of carbon dioxide using spatial decomposed parallel computing

According to the carbon dioxide (CO2) characteristics of weak absorption in the ultraviolet and visible (UV-VIS) bands, a measurement method based on spatial decomposed parallel computing of traditional differential optical absorption spectroscopy is ...

research-article
Design and implementation of an Openflow SDN controller in NS-3 discrete-event network simulator

The NS-3 simulator comes with the Openflow protocol and a rudimentary controller for classic layer-2 bridge simulations. This controller lacks basic functionality provided by real SDN controllers, making it inadequate for experimentation in the scientific ...

research-article
Exploring traffic condition based on massive taxi trajectories

As the increasing volumes of urban traffic data become available, more and more opportunities arise for the data-driven analysis that can lead to the improvements of traffic conditions. In this paper, we focus on a particularly important type of urban ...

research-article
1.25 Gbits/s-message experimental transmission utilising chaos-based fibre-optic secure communications over 143 km

Chaotic optical secure communications (COSC) are a kind of fast-speed hardware encryption technique at the physical layer. Concerning the practical applications, high-speed long-haul message transmission is always the goal to pursue. In this paper, we ...

research-article
Optimisation of ANFIS using mine blast algorithm for predicting strength of Malaysian small medium enterprises

Adaptive neuro-fuzzy inference system (ANFIS) is popular among other fuzzy inference systems, as it is widely applied in business and economics. Many have trained ANFIS parameters using metaheuristic algorithms, but very few have tried optimising its rule-...

research-article
Keyword guessing on multi-user searchable encryption

Multi-user searchable encryption enables the client to perform keyword search over encrypted data while supporting authorisation management. Most of these schemes are constructed using public key encryption. However, public key encryption with keyword ...

research-article
Semi-supervised dimensionality reduction based on local estimation error

The construction of a graph is extremely important in graph-based semi-supervised learning. However, it is unstable by virtue of sensitivity to the selection of neighbourhood parameter and inaccuracy of the edge weights. Inspired by the good performance ...

research-article
Securing SDN controller and switches from attacks

In this paper, we propose techniques for securing the SDN controller and the switches from malicious end-host attacks. Our model makes use of trusted computing and introspection-based intrusion detection to deal with attacks in SDN. We have developed a ...

research-article
Fast graph centrality computation via sampling: a case study of influence maximisation over OSNs

Graph centrality computation, e.g., asking for the most important vertices in a graph, may incur a high time cost with the increasing size of graphs. To address this challenge, this paper presents a sampling-based framework to speed up the computation of ...

research-article
Non-intrusive load monitoring and its challenges in a NILM system framework

With the increasing of energy demand and electricity price, researchers show more and more interest in residential load monitoring. In order to feed back the individual appliance's energy consumption instead of the whole-house energy consumption, non-...

research-article
A similarity algorithm based on hamming distance used to detect malicious users in cooperative spectrum sensing

The collaborative spectrum sensing (CSS) methods have been proposed to improve the sensing performance. However, studies rarely take security into account. CSS methods are vulnerable to the potential attacks from malicious users (MUs). Most existing MU ...

Comments