Products meeting the search criteria
Product Compare (0)
Digital video sometimes needs to be stored and processed in an encrypted format to maintain security..
A fuzzy min–max neural network based on data core (DCFMN) is proposed for pattern classification. A ..
SQL is the standard language for accessing database
servers, including MySQL, Oracle, and SQL Serve..
Wireless Sensor Networks (WSNs) have emerged as research areas with an overwhelming effect on practi..
Wireless networks are computer networks that are not connected by cables of any kind. The use of wir..
Spectrum Sensing Data Falsifiaction (SSDF) attacks are detected in cognitive radio Networks. In this..
In cognitive radio networks, unlicensed users can use under-utilized licensed spectrum to achieve su..
Content-Centric Networking is a new communication architecture that rethinks the Internet communicat..
Firewalls have an important role in network security. However, managing firewall policies is an extr..
Psychological stress is threatening people’s health. It is non-trivial to detect stress timely for p..
The development in wireless technologies and the high availability of wireless equipment in everyday..
Self-organizing network, or SON, technology, which is able to minimize human intervention in network..
It is important to ensure an efficient data transfer between the nodes in wireless communication. In..
There are several applications where demand to determine unexpected activities in a sequence of tim..
Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conve..