The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of a three-dimensional (3D) formation controller for unmanned aerial vehicles (UAVs) associated with an event-triggered transmission protocol is presented in this paper. The formation controller is derived based on a 3D relative kinematic model established upon a local-level coordinate frame, which does not require any absolute global information. The proposed controller is developed...
Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper introduces a dynamically updating key distribution strategy to enhance mesh network security against cyber attack. The scheme has been applied to two security...
This paper presents a distributed lookup protocol named Automatic Balancing Chord(ABC) to solve load imbalance problems in distributed system. Load balancing problems in P2P environment have an important impact on the performance of P2P applications, which are probably caused by allocation of the peer address space, the difference of load size, query uneven distribution and so on. This paper proposes...
As much of the web information nowadays is published by roaming mobile users, and these mobile users may get services from various foreign agents, security, privacy and authentication are important for the roaming service in global mobility networks. In 2011, Chen et al. proposed a lightweight and provably secure user authentication scheme with anonymity for roaming service. We first show that their...
With the booms of mobile communication, especially mobile smart phone, technologies to identify individuals for mobile security calls for some more strict requirements in user-friendly, real-time and ubiquitous aspects. In addition to traditional approaches (for example, password check), some advanced biometric methodologies have been applied in practice, such as fingerprint and iris based solutions,...
Multipath routing can be effectively used to maximize the utilization of network resources for real-time traffic. In mobile ad-hoc network environments, this approach can suffer from co-channel interference due to the simultaneous transmission of packets via multiple routes. In this paper, by exploiting the directionality of directional antennas, a Directional Dynamic Source Routing (DDSR)-based Multipath...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.