Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Table Of Content Section
research-article
Implementing adaptive dragonfly optimization for privacy preservation in IoT

IoT (Internet of Things) is a sophisticated analytics and automation system that utilizes networks, big data, artificial intelligence, and sensing technology, and is controlled by an embedded module. It allows one to use affordable wireless technology and ...

research-article
Discovery of DoS attacks by the ZED-IDS anomaly detector

Intrusion detection is one of the major challenges in today’s security industry. Currently attack surfaces are more extensive than in the past, and the use of anomaly detection tools, able to detect intrusions and malicious activities, is essential to ...

research-article
Tree-based multicast service provisioning with maximum immunity in cognitive radio networks

With the emergence of cognitive radios, the open spectrum access paradigm that is proposed to overcome the shortcomings of the traditional spectrum allocation paradigm became viable. Researchers have been accumulating efforts to verify the validity of ...

research-article
A study on user-input dissemination for wireless sensor networking systems

Wireless sensor network (WSN) is a group of spatially dispersed sensors for monitoring the physical conditions of the environment and organizing the collected data at a central location. Since WSNs typically have no infrastructure, one of the challenges ...

research-article
A Temporal Synchronization Scheme to reduce and compensate for temporal asynchrony in wireless 3D video streaming

Although 3D video has become popular, successful 3D video streaming over wireless networks involves a number of challenges. Due to the frequent frame damages and losses in wireless networks, temporal asynchrony occurs and results in serious visual fatigue ...

research-article
SLCF: Single-hash lookup cuckoo filter

Approximate Membership Query (AMG) data structures are widely used in the networking area recently. The most popular AMQ data structures are Bloom, Quotient and Cuckoo Filter (CF). The CF is more efficient than the Quotient and Bloom filters in term of ...

Comments