The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A mobile wireless sensor network consisting of a large amount of tiny sensors with low-power can be an effective tool for gathering data in a variety of environments. The data collected by each sensor is transmitted to a single processing center that uses all data to determine characteristics of the environment. Sensors deployed in all kinds of areas on a large scale can move with wind and water....
The environment monitoring system of household security robot is designed and implemented based on wireless mesh networks, which are used for monitoring temperature and humidity, gas leaking, fire and housebreaking in family. New tree routing and agent mechanism are proposed to find wireless sensor nodes and forward data. A set of design requirements are developed that cover the hardware design of...
All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and...
Topology selection is an important issue for the design of network on chip systems. At present, typical application-specific NoC systems often integrate a number of heterogeneous components which have varied functions, sizes and communication requirements. Instead of regular topology networks which are not suitable for this sort of NoC systems, irregular mesh network is proposed and applied in NoC...
In this paper, we give the number of ADMs in a unidirectional ring, A(8,N)=lceil5N(N-1)rceil when Nequiv0,1,4,6,7 (mod 16), with the possible exceptions N=36, 38, 39.
The enduring changes of operate demands in network stimulate the production & development of new protocols and new algorithms. But designing and calculating these protocols and algorithms concern many problems. Although it is valuable of the practical experiment in the real circumstance like laboratory and test bed, they lack proper flexibility and expansibility. Under this circumstance, Network...
Due to the steady evolution and increase in sophistication of peer to peer botnets, it is necessary to understand the structural potential in this type of intruder tool. We formally model the P2P botnets with the help of complex systems. We propose metrics to measure the structural potential of different types of P2P botnets. We also propose a simulative framework to investigate the robustness of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.