|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Weihong Ma, Xiangyu Qi, Yi Sun, Ronghua Gao, Luyu Ding, Rong Wang, Cheng Peng, Jun Zhang, Jianwei Wu, Zhankang Xu, Mingyu Li, Hongyan Zhao, Shudong Huang and Qifeng Li
Acquiring phenotypic data from livestock constitutes a crucial yet cumbersome phase in the breeding process. Traditionally, obtaining livestock phenotypic data primarily involves manual, on-body measurement methods. This approach not only requires extens...
ver más
|
|
|
|
|
|
|
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ...
ver más
|
|
|
|
|
|
|
Nurul I. Sarkar and Sonia Gul
Recent advancements in unmanned aerial vehicles (UAVs) have proven UAVs to be an inevitable part of future networking and communications systems. While many researchers have proposed UAV-assisted solutions for improving traditional network performance by...
ver más
|
|
|
|
|
|
|
Rastislav Róka
In this paper, the reasons for the bandwidth and wavelength utilization in future next-generation passive optical networks are presented, and the possibilities for realization and utilization of extended dynamic wavelength and bandwidth algorithms for th...
ver más
|
|
|
|
|
|
|
Andreas G. Savva, Theocharis Theocharides and Chrysostomos Nicopoulos
Nowadays, due to their excellent prediction capabilities, the use of artificial neural networks (ANNs) in software has significantly increased. One of the most important aspects of ANNs is robustness. Most existing studies on robustness focus on adversar...
ver más
|
|
|
|
|
|
|
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth...
ver más
|
|
|
|
|
|
|
Biao Wang, Haobo Zhang, Yunan Zhu, Banggui Cai and Xiaopeng Guo
Low energy consumption has always been one of the core issues in the routing design of underwater sensor networks. Due to the high cost and difficulty of deployment and replacement of current underwater nodes, many underwater applications require the rou...
ver más
|
|
|
|
|
|
|
Muhammad Amish Hasan, Tanveer Ahmad, Asim Anwar, Salman Siddiq, Abdul Malik, Waseem Nazar and Imran Razzaq
Nonorthogonal multiple access (NOMA), one of the favorable candidates of next-generation wireless networks combined with group device-to-device (D2D) networks, can sufficiently increase a system?s spectral efficiency. In fact, in a cooperative scenario, ...
ver más
|
|
|
|
|
|
|
Pavla ?mídová and Stanislav Machalík
European rail transport policy aims to create a single railway area. European Union (EU) issues, for this purpose, sets of regulations and directives. Individual countries are involved in its implementation according to their capabilities. The aim of thi...
ver más
|
|
|
|