678 results found.
Year: 2020, Volume: 20, Number: 2
... Firefly Algorithm Based Optimization Model for Planning of Optical Transport Networks Bruno Quirino de OLIVEIRA1,2, Marcos Antônio ... in order to meet the new traffic requirements. Under network becomes more complex, the efficient use of its ... j.jii.2018.01.005. distribution," Journal of Optical Communications and Networking, [4] Q. Wang, G ...
Terms matched: 4 - Score: 358 - 1,360k
Year: 2014, Volume: 14, Number: 2
... would enable the creation remote instruments and drives via social networks (SN) into of instrumentation communities. instrumentation ... , our research computerized instrumentation, data acquisition, social network methodology was structured as follows: services, Twitter ... Computer Engineering Volume 14, Number 2, 2014 Social Networking of Instrumentation – a Case Study in Telematics Dan ...
Terms matched: 4 - Score: 329 - 1,596k
Year: 2024, Volume: 24, Number: 2
... generation of a dataset and the decision trees, neural networks, and support vector machines implementation of the Cockroach ... Engineering Volume 24, Number 2, 2024 Enhancing V2G Network Security: A Novel Cockroach Behavior-Based Machine Learning Classifier ... of the results. (IDS) based on Software-Defined Networking (SDN) and Basnet et al. proposed ...
Terms matched: 4 - Score: 308 - 876k
Year: 2023, Volume: 23, Number: 2
... maps. S represents the coordinates obtained from Recurrent Neural Networks for landmark prediction and a the predicted heatmaps, ... and end-to-end differentiable, they fail to consider the Regression Network (SHBRN), consisting of a rough estimation ... the heatmap of the jth landmark at the ith hourglass sub-network, backbone of refinement network, which contains multiple ...
Terms matched: 4 - Score: 303 - 2,548k
Year: 2021, Volume: 21, Number: 1
... routing, with the bridge capabilities; connect the entire networks to video surveillance, wireless mesh networks. external ... Traffic Load and Delay Aware Routing Metric for Wireless Mesh Network Satish BHOJANNAWAR, Shrinivas MANGALWEDE Department of Computer Science ... surveillance, as it supports the requisite throughput, various networking application, such as video surveillance. In redundancy ...
Terms matched: 4 - Score: 234 - 1,182k
Year: 2010, Volume: 10, Issue: 3
... transient stability (T /S) studies of electrical networks using kind of sensitivity analysis making it possible to ... conceptual framework of the proposed in any branch of the network due to a winding fault of a power method ... suppose these α= diag[α i ], subnetworks are substantially isolated. Under such P= [ ...
Terms matched: 4 - Score: 222 - 817k
Year: 2013, Volume: 13, Number: 4
... A Novel MAC Protocol to Alleviate Congestion in Wireless Sensor Networks Lili QIAN1, Chen FANG1, Octavia A. ... on which the sensor nodes go to sleep periodically. network topology is simple, a strong congestion can take ... Traffic adaptive mac protocol for wireless sensor network," Networking and Mobile experiments show that the proposed protocol provides ...
Terms matched: 4 - Score: 221 - 789k
Year: 2007, Volume: 7, Issue: 2
... (28), 2007 Security of Mobile ad-hoc Wireless Networks. A Brief Survey Doru E. TILIUTE " ... most present issues of computer the overall cost of the network. Bandwidth is narrow wireless networks is the security ... delays in packet delivery. application layer, with no network-level multicast support Therefore, any key management scheme should ...
Terms matched: 4 - Score: 220 - 432k
Year: 2012, Volume: 12, Number: 1
... 1, 2012 Cluster-based Data Gathering in Long-Strip Wireless Sensor Networks Weiwei FANG, Shengxin LI, Xiangmin LIANG, ... , the locomotive of the train formed in the whole network through contention-based cluster freight. The many-to-one traffic pattern ... Proc. 7th Annual International Conference on Mobile Computing and Networking (MobiCom), network characteristics and limitations, ...
Terms matched: 4 - Score: 216 - 670k
Year: 2021, Volume: 21, Number: 3
... to Authoritative Name Server network-based system is proposed on live networks to prevent the common DNS tunneling threats over DNS ... in Fig. 1. Networks trained with various deep network topologies by 4. To ensure efficient address resolution ... Xie, "An empirical analysis of data Conference on Networking, Embedded and Wireless Systems, India, preprocessing ...
Terms matched: 4 - Score: 198 - 3,986k