-
101
Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks
Published 2017-06-01“…How to protect sensors from attacks of malicious mobile agents becomes an important issue in the field. Traditional access control strategies such as hybrid encryption mechanism, partial results of the package, and other methods have some defects in the application. …”
Get full text
Article -
102
Recognition of Reconstructed Frontal Face Images Using FFT-PCA/SVD Algorithm
Published 2020-01-01“…Modern face recognition modules/algorithms have been successful in many application areas (access control, entertainment/leisure, security system based on biometric data, and user-friendly human-machine interfaces). …”
Get full text
Article -
103
A plithogenic statistical approach to digital security measures and emotional health in childhood and adolescence
Published 2024-11-01“…Utilizing a plithogenic statistical approach, which accounts for the complex, indeterminate nature of these variables, this study examined how various dimensions of digital security—including confidentiality, integrity, authentication, and access control—impact key aspects of minors' emotional well-being. …”
Get full text
Article -
104
An Autonomous Packet Transmission Strategy for Opportunistic Wireless Sensor Networks
Published 2012-11-01“…Proposed schemes are based on the principle of cross-layer design that integrates with physical layer characteristics of wireless channel and medium access control (MAC) layer characteristics of network. …”
Get full text
Article -
105
Scalable Video Streaming for Single-Hop Wireless Networks Using a Contention-Based Access MAC Protocol
Published 2008-01-01“…This paper aims to enhance the quality of video streaming applications in wireless home networks via a joint optimization of video layer-allocation technique, admission control algorithm, and medium access control (MAC) protocol. Using an Aloha-like MAC protocol, we propose a novel admission control framework, which can be viewed as an optimization problem that maximizes the average quality of admitted videos, given a specified minimum video quality for each flow. …”
Get full text
Article -
106
Research on Public Administration and Resource Allocation Based on Blockchain and Structured Occupational Therapy
Published 2022-01-01“…On the basis of summarizing and analyzing the previous published literatures, this study expounded the research status and significance of public administration and resource allocations; elaborated the development background, current status and future challenges of blockchain, and structured occupational therapy; introduced the methods and principles of data quality collaboration model and multiparty collaboration standard management; analyzed the case background of public administration and resource allocation in the prevention and control of the COVID-19 epidemic; discussed the public administration mechanism based on blockchain and structured occupational therapy; established a resource allocation method based on blockchain and structured occupational therapy; fathomed the role of the distributed ledger established by blockchain to increase the information symmetry of public administration activities; proposed a blockchain-established special machine trust for resource allocation; and finally, anatomized the data security sharing and access control mechanism based on blockchain and structured occupational therapy. …”
Get full text
Article -
107
A scalable neighbor-based routing protocol for mobile ad hoc networks
Published 2016-09-01“…Simulation results show that scalable neighbor-based mobile routing outperforms both protocols, the neighbor coverage-based probabilistic rebroadcast and the ad hoc on-demand distance vector, in terms of routing overhead, medium access control collision, end-to-end delay, packet delivery ratio, and energy consumption.…”
Get full text
Article -
108
Modeling MAC Protocol Based on Frame Slotted Aloha for Low Energy Critical Infrastructure Sensor Networks
Published 2015-06-01“…We propose and analyse a medium access control (MAC) protocol for low energy critical infrastructure monitoring (LECIM) networks. …”
Get full text
Article -
109
Feature Extraction in Densely Sensed Environments: Extensions to Multiple Broadcast Domains
Published 2015-08-01“…In this paper, we present a feature extraction mechanism for dense networks that takes advantage of dominance-based medium access control (MAC) protocols to (i) efficiently obtain global extrema of the sensed quantities, (ii) extract local extrema, and (iii) detect the boundaries of events, by using simple transforms that nodes employ on their local data. …”
Get full text
Article -
110
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…Abstract As an access control technology of digital material, digital rights management systems have a profound effect on the copyright protection of digital content. …”
Get full text
Article -
111
IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality
Published 2014-01-01“…In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. …”
Get full text
Article -
112
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. …”
Get full text
Article -
113
Implementation of CSMA/CA-Based MAC Protocol for Optical Camera Communication
Published 2025-01-01“…However, OCC faces challenges in medium access management, which necessitates the development of effective medium access control (MAC) protocols. The IEEE 802.15.7 standard proposes MAC protocols tailored for various OCC modes and simplifies frame structures. …”
Get full text
Article -
114
Research on Mental Health Monitoring Scheme of Migrant Children Based on Convolutional Neural Network Based on Deep Learning
Published 2022-01-01“…In order to obtain a better identification effect of mental health problems of children, this paper attempts to use multisource data, including consumption data, access control data, network logs, and grade data, and proposes a multisource data-based mental health problem identification algorithm. …”
Get full text
Article -
115
Using Shadow Page Cache to Improve Isolated Drivers Performance
Published 2015-01-01“…In order to prevent users’ virtualization environments being impacted by driver faults in virtual machine, Chariot examines the correctness of driver’s write operations by the method of combining a driver’s write operation capture and a driver’s private access control table. However, this method needs to keep the write permission of shadow page table as read-only, so as to capture isolated driver’s write operations through page faults, which adversely affect the performance of the driver. …”
Get full text
Article -
116
Reinforcement Learning-Based Routing Protocol to Minimize Channel Switching and Interference for Cognitive Radio Networks
Published 2020-01-01“…In the existing network-layered architectural stack of Cognitive Radio Ad Hoc Network (CRAHN), channel selection is performed at the Medium Access Control (MAC) layer. However, routing is done on the network layer. …”
Get full text
Article -
117
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
Published 2019-04-01“…Ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decryption key and a semi-honest authority may illegally issue decryption keys for unauthorized users for profits. …”
Get full text
Article -
118
Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics
Published 2024-12-01“…To address these challenges, this article proposes technical countermeasures such as utilizing diverse Privacy Enhancing Technologies (PETs) to enhance data anonymity, optimizing data encryption techniques, and reinforcing data monitoring and access control management. Legal measures should include establishing a comprehensive data security protection framework, clarifying accountability, and developing standards for the classification and grading of autonomous vehicle data. …”
Get full text
Article -
119
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01“…In this paper, we proposed VERDUP, a verifiable and secure deduplication scheme with the support of real-time data integrity checking and fine-grained access control specifically designed for IIoT environments. …”
Get full text
Article -
120
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures
Published 2025-01-01“…In fact, ISAC operates in the wireless PHY and Medium Access Control (MAC) layers, where it is impossible to protect information with standard encryption techniques or with any other purely digital methodologies. …”
Get full text
Article