The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-sensor fusion has been extensively studied i information fusion field, and the distributed target detection i one of the most important applications in the multiple sensor detection theories. In this paper, a data fusion algorithm for target detection is proposed based on tree topology combine with the orderly full binary tree and we discuss the optima threshold fusion rule problem. Different...
In Wireless Local-Area Networks (WLANs), most of the wireless Access Points (APs) work at the full power level. So, the conflicting channels may have a significant and inevitable impact on throughput and transmission delay when the density of the APs is increasing. This paper proposes a power control algorithm, Dynamic Power Control called DPC based on NetFlow. DPC applies a fine tuning idea to get...
Cyber-physical system (CPS) cooperates with physical processes and integrates computing, communication and control (3C) into multiple levels of cyber processing and operation management to streamline and fortify the operation of physical systems. One of the basic operations of CPS is to finish data gathering and forwarding by networking (often wireless) with intermittent network connectivity. Due...
An initial guess method with intensity-only data is presented to solve the inverse scattering problem in this paper. The purpose of the method is to reduce the computation time by introducing the weak scattering into the multiplicative regularized contrast sources inversion method (MRCSI), which can degenerate the nonlinear inverse problem into a linear one and reduces the computation time drastically...
Disruption-tolerant networks (DTNs) provide a promising low-cost solution to transfer data in network environment where the connectivity is sporadic and unpredictable. Many existing methods for opportunistic data forwarding depend on the hypothesis that every node forwards messages regardless of the identities of the senders or receivers, however, the networks based on such methods are fragile under...
The black hole attack is one of the security attacks that occur in Mobile Ad-hoc Networks (MANETs). In the attack, a malicious node exploits the routing protocol to advertise itself as having the shortest path to the node whose data packets it wants to intercept. In this paper, the black hole problem is addressed. An authentication mechanism, based on the hash function, the Message Authentication...
Mobile ad-hoc networks (MANETs) are based on cooperative and trust characteristic of mobile nodes. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANETs are very vulnerable to various attacks. To enhance the security of MANETs, it is important to rate the trustworthiness of other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.