The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The modern vehicles nowadays are managed by networked controllers. Most of the networks were designed with little concern about security which has recently motivated researchers to demonstrate various kinds of attacks against the system. In this paper, we discussed the vulnerabilities of the Controller Area Network (CAN) within in-vehicle communication protocol along with some potential attacks that...
This letter investigated a device-to-device (D2D) communication underlaying cellular system, where one wireless device (WD) can directly transmit information to two inner users under non-orthogonal multiple access (NOMA) protocol with low latency. Considering the user fairness and reliability, both users can adopt successive interference cancellation (SIC) to decode information by the given decoding...
The paper presents a two-phase state based multi-beam-switching scheme implemented on a custom-designed 4 × 4 antenna array operating with a bandwidth of 1.5 GHz around 14 GHz. The antenna array and the beam-switching scheme have been experimentally validated. A phasing network designed to produce two phase states is used to experimentally validate the beam-switching and five beam states are presented,...
The frequent occurrence of traffic accidents has always been an important problem troubling traffic safety management, so exploring the law and characteristics of case occurrence in a space area has profound significance for the prevention of traffic accidents. Starting from the space-time angle and based on the traffic accident data, this article firstly carries out the wavelet decomposition of the...
Two methods for improving the detection performance of neural networks are introduced in this paper, multi-feature map detection and multi-branch convolution structure. The former is to analyze the features of each convolution layer in the network separately, because these features have different resolutions and correspond to objects of different sizes. Finally, the comprehensive judgment of the analysis...
Wireless sensor networks are featured by restricted network resources, which is quite possible to result in low positioning precision and serious time delay in positioning, accordingly, the overall network positioning quality may be reduced; to improve the positioning precision of WSN, based on the DV-HOP positioning algorithm, two aspects of the node positioning were improved from the error precision...
Vehicular cloud is getting significant research attention due to the technological advancements in smart vehicles. In near future, vehicles are envisioned to become part of a grid network providing cloud services, such as computing, storage, network, and application as a service. Vehicular cloud computing is an emerging area, designed to support delay-sensitive applications. However, this integration...
In cognitive radio (CR) ad-hoc network, the characteristics of the frequency resources that vary with the time and geographical location need to be considered in order to efficiently use them. Environmental statistics, such as an available transmission opportunity and data rate for each channel, and the system requirements, specifically the desired data rate, can also change with the time and location...
Electronic voting (e-voting) is an electronic means for casting and counting votes. It is an efficient and cost-effective way for conducting a voting procedure, which has characteristic of being magnanimous data and real time and requesting high safety. However, concerns on security of networking and privacy of communication for e-voting have been grown. Securing e-voting is very urgent and has becoming...
The ant colony optimization algorithm is an effective way to solve the problem of unmanned vehicle path planning. First, establish the environment model of the unmanned vehicle path planning, process and describe the environmental information, and finally realize the division of the problem space. Next, the biomimetic behavior of the ant colony algorithm is described. The ant colony algorithm has...
Internet of Things (IoT) is rapidly developed and widely deployed in recent years, which makes the sensory data generated by IoT systems explode. The huge amount of sensory data generated by some IoT systems has already exceeded the storage, transmission, and computation capacities of IoT systems. However, the valuable sensory data which is highly related to a query in an IoT system is relatively...
Cache placement is an integral part of information centric networking (ICN) for optimizing the performance of network. The majority of the existing research on cache placement explores fixed or semi fixed network. The present study proposed a cache placement/update policy in a mobile ad-hoc network (MANET) environment, where the consumers and providers of information are constantly moving. On the...
Mobile edge computing (MEC), as the key technology to improve user experience in a 5G network, can effectively reduce network transmission delay. Task migration can migrate complex tasks to remote edge servers through wireless networks, solving the problems of insufficient computing capacity and limited battery capacity of mobile terminals. Therefore, in order to solve the problem of “how to realize...
Channel allocation is the prerequisite for the HAPS (high-altitude platform station) 5G communication network to transmit information. An intelligent wireless channel allocation algorithm for HAPS 5G massive MIMO (multiple-input multiple-output) system based on reinforcement learning was proposed. Q-learning reinforcement learning algorithm and the back-propagation neural network were combined, which...
The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log template extraction is an important prerequisite for log sequence anomaly detection. The problems of the existing log template extraction methods are mostly offline, and the few online methods have insufficient F1-score in multi-source log data...
Mobile social network (MSN) consists of a flavor of social science and wireless communications for mobile networking. A mode to provide communication process between different nodes with similar interest’s exploits MSN. Content delivery network (CDN) improves the network performance of MSN and provide quick and quite reliable applications by distributing content through some agents placed nearby the...
Future wireless networks are expected to constitute a distributed intelligent wireless communications, sensing, and computing platform, which will have the challenging requirement of interconnecting the physical and digital worlds in a seamless and sustainable manner. Currently, two main factors prevent wireless network operators from building such networks: (1) the lack of control of the wireless...
Wireless sensor networks (WSNs) have many applications in climate monitoring, fire detection, smart homes, and smart cities, as well as detecting and monitoring dynamic, spatio-temporal events such as storms, traffic, and animal movement. WSNs are an important component of the Internet of Things (IoT), and they play an important role in monitoring and collecting surrounding context and reporting the...
This paper proposes a bi-level route guidance method based on macroscopic fundamental diagram (MFD) for urban road network, which is a combination of central route guidance and distributed route guidance and it considers the intentions of both traffic management and traveler. It is a compromise of system optimum and user optimum. In upper-level route guidance, traffic dynamic evolution model of route...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.