A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Standardisation advancements in the area of routing for mobile ad-hoc networks
2011
Journal of Supercomputing
In this paper, we provide a background on the possibility to use MANETs for enabling future pervasive internet and innovative ubiquitous services. ...
It is mainly observed that there is a need for adaptive hybrid routing approaches in order to support future ubiquitous and pervasive applications. Consequently, we finally present our conclusions. ...
In such a case, in order to update routes in a timely manner, the intervals have to decreased in order to have faster route update periods as described in Table 2 . ...
doi:10.1007/s11227-011-0705-2
fatcat:3p5cvff3bfcanalpd3t3kxt7tq
Communication and networking technologies for UAVs: A survey
[article]
2020
arXiv
pre-print
With the advancement in drone technology, in just a few years, drones will be assisting humans in every domain. But there are many challenges to be tackled, communication being the chief one. ...
Encryption and optimization techniques for ensuring long lasting and secure communications, as well as for power management, are discussed. ...
Field trials were performed by a number of telecommunication companies to analyze the performance of a cellular-connected UAV in a commercial cellular network and to compare handover and link reliability ...
arXiv:2009.02280v1
fatcat:fx7hr332qbbfble6rbyuxirrn4
Active Queue Management: A Survey
2013
IEEE Communications Surveys and Tutorials
Since its formal introduction to IP networks in 1993 as a viable complementary approach for congestion control, there has been a steady stream of research output with respect to Active Queue Management ...
This survey attempts to travel the trajectory of AQM research from 1993 with the first algorithm, Random Early Detection (RED), to current work in 2011. ...
In a MANET a mobile node may simultaneously connect with other mobile nodes and other networks (i.e., acting as a gateway). ...
doi:10.1109/surv.2012.082212.00018
fatcat:r3yhuadtoffoflpjw527ztn3rq
Sensor Networks for High-Confidence Cyber-Physical Systems
2011
International Journal of Distributed Sensor Networks
Chen et al. propose a model to predict link interruption and route interruption in UASNs by the historical link information and channel state obtained by periodic detection. ...
In the paper "Link prediction and route selection based on channel state detection in UASNs," J. ...
Acknowledgments It has been a great pleasure for us to organize this special issue. ...
doi:10.1155/2011/245734
fatcat:lswungc2orda5pcqvpyqu7vrna
A layered security approach for cooperation enforcement in MANETs
2017
Work therefore needs to be done in order to develop a distributed detection mechanism for identity spoof detection in MANET environments. ...
One is the base station that is directly connected to a computer or a laptop via a wired link, in order to collect data from the transmitting sensors. ...
In the case where the packet has no established route, the decision path from box 2 in Figure B . 1 will be No. " In box 3, a check is made to establish whether it is a broadcast packet, in this case, ...
doi:10.24377/ljmu.t.00006091
fatcat:oaivc54gjnaz5kabw6hnktow6i
Trust-based recommendation systems in Internet of Things: a systematic literature review
2019
Human-Centric Computing and Information Sciences
Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected ...
This creates the possibility for physical objects present in a self-organized manner without a central administration and leads to meaningful human-machine interaction in IoT scenario [3] . ...
Then, data can either routed to a principal node called sink or be to collected and analyzed prior to sending to the sink node. ...
doi:10.1186/s13673-019-0183-8
fatcat:ckozm3ixungbvpc37agoxc5arm
Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks under Secure Sparse Regeneration
2013
IOSR Journal of Electronics and Communication Engineering
Each application requires its own QoS threshold attributes like physical layer properties, delay as a result of transmission and reliability of the link. ...
There are two algorithms MCM-SPT and MCM-DM required for manycasting to resolve the multiconstraint QoS drawback. ...
Also the author would like to thank reviewers for their valuable comments to improve the quality of the paper. ...
doi:10.9790/2834-0460108
fatcat:5qasfbq4n5cbpln42h3pa3cucq
Exploratory Research Opportunities Of Computing In Life Sciences
2022
International Journal of Life Science and Pharma Research
As a result, one of the most important tasks for this study in the next years will be to extract relevant statistics from enormous amounts of data and to build larger computer models to examine the more ...
Computers are employed in lifestyle science in a variety of ways, including the usage of sensors and other devices that only a laptop can comprehend, as well as computers' incredible ability to do complex ...
DEBH (Detecting and Eliminating Black Holes) for sensing and detaching the cooperative black hole nodes in MANET. ...
doi:10.22376/ijpbs/ijlpr/sp20/march.2022.5-200
fatcat:vowymyh3mzc6nmm4im4dvlpm7a
MDP-based Vehicular Network Connectivity Model for VCC Management
2020
2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)
Vehicular Cloud computing is a new paradigm in which vehicles collaboratively exchange data and resources to support services and problem-solving in urban environments. ...
Also, from analyses, we observed that higher vehicle connectivity presents a trace of repeated connection patterns. ...
Moreover, in the peculiar case of V2V connections, a vehicle observes a multihop, on or more hops, connection. ...
doi:10.1109/ds-rt50469.2020.9213698
dblp:conf/dsrt/SaadG20
fatcat:uohxphn5azevfgw54l7i4sdwmi
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems
[chapter]
2009
Lecture Notes in Computer Science
These effects and memory limitations require a balanced neighborhood management to ensure agility, stability, symmetry, and connectivity. ...
, and hence, ensures memory safety for TinyOS based applications. ...
The authors of [8] adapt ADMR (Adaptive Demand-driven Multicast Routing), a multicast protocol for MANETS, on a real wireless sensor node (MICAz). ...
doi:10.1007/978-3-642-02118-3_2
fatcat:prjsfyqcojcnpcetw7vfnvqwpy
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
., access control, authentication and encryption) have been considered for the SDN, NFV, and network slicing. 5G is set to be a faster broadband that is connected with Internet and Intranet protocols, ...
The proposed protocol detects more attacks than IEEE 802.11s/i and Authenticated Routing for Ad hoc Networks (ARAN). ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture
2021
Zenodo
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis ...
Failure to honor this agreement can lead to denial of service for the consumer or legal liability for the service provider. ...
For example, the connected network that interconnects the internal systems in a cloud has to be secure within existing environment. ...
doi:10.5281/zenodo.5148421
fatcat:lzanqvxdlre2dh3hdhjxibdrim
COREnect D3.3. Initial COREnect industry roadmap
[article]
2021
Zenodo
Therefore, technologies to cope with untrusted third-party IP (EG1), telecommunication hardware and software (EG2) and failure detection and security technologies (EG3) are contributing to the question ...
This could help to ensure that Europe plays a sufficient role on this topic. ...
Appendix The COREnect roadmap activities strongly rely on interactions with experts in the field. ...
doi:10.5281/zenodo.5075317
fatcat:ww7icphzfjcdjlxbsbo2qekghy
ADVANCES IN MANAGEMENT, IT, EDUCATION, SOCIAL SCIENCES MANEGMA 2019
2019
Zenodo
I would also like to acknowledge our thanks to our parents for their valuable support and encouragement during the period of our study. ...
Acknowledgement We would like to express our gratitude towards our guide Mrs.Shifana Begum, Assistant Professor, Dept. of CSE, Srinivas School of Engineering, Mukka for her support, guidance and encouragement ...
Link Stability Factor (LSF) can be defined as: LSF = ∑Link -failure /cost (TLC): Tree Link cost (TLC) is the cost which is required to maintain a tree link and it can be derived as, TLC = (rB + rq B) / ...
doi:10.5281/zenodo.3250779
fatcat:rgrz3gtqhnfolkur7bsi7xyzue
VEHICULAR 2017 Committee VEHICULAR Steering Committee VEHICULAR 2017 Technical Program Committee
2017
unpublished
We are grateful to the members of the VEHICULAR 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. ...
Subliminally delivered information, unobtrusive techniques for driver's state detection, and mitigation or regulation interfaces enlarge the spectrum of challenges in vehicular systems. ...
ACKNOWLEDGEMENT The authors would like to thank our colleague Thomas Strubbe for detailed discussions. Also thanks to the anonymous reviewers for the valuable comments. ...
fatcat:e7rotypi3jabtfh52gqbmfinxe
« Previous
Showing results 1 — 15 out of 36 results