بحث بسيط
السجلات المعروضة 21 -- 30 من 100
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
(
Academic Press Inc.
, 2021 , Article)
HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ...
An adaptive network coding scheme for multipath transmission in cellular-based vehicular networks
(
MDPI AG
, 2020 , Article)
With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has ...
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
(
Association for Computing Machinery
, 2022 , Article)
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
A co-design-based reliable low-latency and energy-efficient transmission protocol for uwsns
(
MDPI AG
, 2020 , Article)
Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. ...
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
(
Elsevier B.V.
, 2021 , Article)
Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ...
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ...
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
(
IEEE Computer Society
, 2021 , Other)
5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...
System log detection model based on conformal prediction
(
MDPI AG
, 2020 , Article)
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ...
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...