-
901
Reinforcement Learning Environment for Advanced Vehicular Ad Hoc Networks Communication Systems
Published 2022-06-01“…The obtained results show significant improvement in the routes’ strength compared with traditional communication protocols and even with other RL tools when only one parameter is used for decision making.…”
Get full text
Article -
902
Deep Learning for Counting People from UWB Channel Impulse Response Signals
Published 2023-08-01“…The use of higher frequency bands compared to other wireless communication protocols enhances the capability of accurately determining locations from ultra-wideband (UWB) signals. …”
Get full text
Article -
903
The Challenge of Long-Distance Over-the-Air Wireless Links in the Ocean: A Survey on Water-to-Water and Water-to-Land MIoT Communication
Published 2022-06-01“…It contains an analysis of short-range and long-range over-the-air radio-frequency wireless communication protocols and the synergy between these two in the pursuit of an MIoT. …”
Get full text
Article -
904
Internet of Things Platforms for Academic Research and Development: A Critical Review
Published 2022-02-01“…This paper provides a review of existing platforms, both adopting a closed source and an open source access model, focusing on five evaluation criteria: communication protocols, data visualization, data processing, integration with external services and security. …”
Get full text
Article -
905
A Lightweight Authentication Scheme for V2G Communications: A PUF-Based Approach Ensuring Cyber/Physical Security and Identity/Location Privacy
Published 2020-09-01“…However, using communication protocols to exchange vital information leads grid to being vulnerable against various types of attack. …”
Get full text
Article -
906
Application and Development of QKD-Based Quantum Secure Communication
Published 2023-04-01“…QKD-based quantum secure communication (QSC) enhancing the security of key generation and update rate of keys, which could be integrated with a variety of cryptographic applications and communication protocols, has become one of the important solutions to improve information security. …”
Get full text
Article -
907
An Adaptive State Consistency Architecture for Distributed Software-Defined Network Controllers: An Evaluation and Design Consideration
Published 2024-03-01“…The absence of standardized communication protocols for East-bound SDN interfaces underscores the need for high-performance communication among diverse SDN controllers to maintain consistent state exchange. …”
Get full text
Article -
908
Data Integration Framework to Collect Data from OT/IT Systems
Published 2023-05-01“…In a corporate environment, the age of equipment is extremely heterogeneous, in addition to state-of-the-art equipment, legacy systems can also be found in the machine park, which do not have appropriate communication protocols. Also, with the increase in the number of data sources, the management of data is becoming more and more challenging. …”
Get full text
Article -
909
$ H_\infty $ deployment of nonlinear multi-agent systems with Markov switching topologies over a finite-time interval based on T–S fuzzy PDE control
Published 2024-01-01“…By designing special communication protocols, the collective dynamics of numerous agents are modeled by simple fist-order and second-order PDEs. …”
Get full text
Article -
910
A 5.9 GHz Channel Characterization at Railroad Crossings for Train-to-Infrastructure (T2I) Communications
Published 2023-05-01“…We believe that vehicular communication protocols can evolve the train communication systems into the next generation. …”
Get full text
Article -
911
Networking architectures and protocols for smart city systems
Published 2018-12-01“…However, in order to reach these important objectives, efficient networking and communication protocols are needed to provide the necessary coordination and control of the various system components. …”
Get full text
Article -
912
Development of an Intelligent Classifier Model for Denial of Service Attack Detection
Published 2023-09-01“…These systems are typically characterized by their modest computationa requirements and use of lightweight communication protocols, such as MQTT. However, the rising adoption of IoT technology has also led to the emergence of novel attacks, increasing the susceptibility of these systems to compromise. …”
Get full text
Article -
913
Formal verification of the pub-sub blockchain interoperability protocol using stochastic timed automata
Published 2023-09-01“…Amid the proliferation of blockchain ventures, for ensuring the correctness of inter-blockchain communication protocols, manual checking and testing of all the potential pitfalls and possible inter-blockchain interactions are rarely possible. …”
Get full text
Article -
914
Switching and Swapping of Quantum Information: Entropy and Entanglement Level
Published 2021-06-01“…Information switching and swapping seem to be fundamental elements of quantum communication protocols. Another crucial issue is the presence of entanglement and its level in inspected quantum systems. …”
Get full text
Article -
915
Intelligent trading/metering/billing system (ITMBS)-II : network
Published 2014“…Then, the core section which describes the methods of acquiring data information from meters with different communication protocols and from other resources is elaborated, and at last the influence on load profile in residential ranged areas is discussed.…”
Get full text
Thesis -
916
Symbolic verification and strategy synthesis for linearly-priced probabilistic timed automata
Published 2017“…A variety of techniques have been proposed for the analysis of this formalism and successfully employed to analyse, for example, wireless communication protocols and computer security systems. Augmenting the model with prices (or, equivalently, costs or rewards) provides a means to verify more complex quantitative properties, such as the expected energy usage of a device or the expected number of messages sent during a protocol's execution. …”
Conference item -
917
Constrained bandwidth allocation in multi-sensor information fusion: A mechanism design approach
Published 2005“…We apply the mechanism to multi-sensor target detection and consider the complexity of finding an efficient solution with broadcast communication protocols. © 2005 IEEE.…”
Journal article -
918
Automated Verification Techniques for Probabilistic Systems.
Published 2011“…Applications of the techniques in this tutorial include performance and dependability analysis of networked systems, communication protocols and randomised distributed algorithms. …”
Journal article -
919
Architectural design of a multi-agent system for handling metadata streams.
Published 2001“…As a result, our architecture supports various communication protocols, including UDP, RMI, SSL, or multicast. …”
Journal article -
920
Robust blimps formation using wireless sensor based on Received Signal Strength Indication (RSSI) localization method
Published 2017“…In this work, the WSN were used as the data communications protocol which provides robust communication using the mesh networking. …”
Get full text
Article