PACKETS

作品数:45被引量:41H指数:3
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:李涛石元泉张瑜罗自强马燕更多>>
相关机构:怀化学院四川大学海南师范大学湖南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金高等学校学科创新引智计划北京市自然科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Dynamic Deep Learning for Enhanced Reliability in Wireless Sensor Networks: The DTLR-Net Approach
《Computers, Materials & Continua》2024年第11期2547-2569,共23页Gajjala Savithri N.Raghavendra Sai 
In the world of wireless sensor networks(WSNs),optimizing performance and extending network lifetime are critical goals.In this paper,we propose a new model called DTLR-Net(Deep Temporal LSTM Regression Network)that e...
关键词:WSN LIFETIME NODES mobile sinks energy PACKETS security 
Resilient TCP Variant Enabling Smooth Network Updates for Software-Defined Data Center Networks
《Tsinghua Science and Technology》2024年第5期1615-1632,共18页Abdul Basit Dogar Sami Ullah Yiran Zhang Hisham Alasmary Muhammad Waqas Sheng Chen 
supportted by the King Khalid University through the Large Group Project(No.RGP.2/312/44).
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not ...
关键词:software defined data center networks network updates DCTCP out-of-order packets packet drop SDN 
Data delivery delay and cross-layer packet size analysis for reliable transmission of Licklider transmission protocol in space networks
《Science China(Information Sciences)》2024年第9期225-240,共16页Guannan YANG Ruhai WANG Kanglian ZHAO Wenfeng LI Dong YAN 
supported by Chongqing Key Laboratory of Mobile Communications Technology(Grant No.cqupt-mct-202203)。
Delay/disruption tolerant networking(DTN)is proposed as a networking architecture to overcome challenging space communication characteristics for reliable data transmission service in presence of long propagation dela...
关键词:Licklider transmission protocol DTN bundle protocol cross-layer packets size space communication 
Development of Recovery and Redundancy Model for Real Time Wireless Networks
《Journal of Computer Science Research》2022年第3期12-19,共8页Boniface Kayode Alese Bamidele Moses Kuboye Omolara Iyabode Alabede 
The growth in wireless technologies applications makes the necessity of providing a reliable communication over wireless networks become obvious.Guaranteeing real time communication in wireless medium poses a signific...
关键词:Sequential time division multiple access(S-TDMA) Wireless REDUNDANCY PACKETS Media access control(MAC) 
High Performance Priority Packets Scheduling Mechanism for Big Data in Smart Cities
《Computers, Materials & Continua》2022年第7期535-559,共25页Fawaz Alassery 
This study is supported through Taif University Researchers Supporting Project Number(TURSP-2020/150),Taif University,Taif,Saudi Arabia.
Today,Internet of Things(IoT)is a technology paradigm which convinces many researchers for the purpose of achieving high performance of packets delivery in IoT applications such as smart cities.Interconnecting various...
关键词:Packets transmission scheduling scheme in IoT software defined networking big data smart cities applications for priority packets 
Pricing Policy for a Dynamic Spectrum Allocation Scheme with Batch Requests and Impatient Packets in Cognitive Radio Networks
《Journal of Systems Science and Systems Engineering》2022年第2期133-149,共17页Haixing Wu Shunfu Jin Wuyi Yue 
supported in part by National Natural Science Foundation of China under Grant Nos.61872311,61973261 and 62006069;supported in part by MEXT,Japan.Also。
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate manner....
关键词:Cognitive radio networks dynamic spectrum scheme batch arrival impatient packets Markov chain social optimization 
Drag reduction and hairpin packets of the turbulent boundary layer over the superhydrophobic-riblets surface被引量:1
《Journal of Hydrodynamics》2021年第3期621-635,共15页Xin-wei Wang Zi-ye Fan Zhan-qi Tang Nan Jiang 
Projects supported by the National Natural Science Foundation of China(Grant Nos.11732010,11972251).
This paper presents experimental measurements by the time-resolved particle image velocimetry(TR-PIV)for the turbulent boundary layer(TBL)over the smooth surface,the superhydrophobic(SH)surface,and the superhydrophobi...
关键词:Turbulent boundary layer SUPERHYDROPHOBIC RIBLETS drag reduction hairpin packets 
M-IRSA:Multi-Packets Transmitted Irregular Repetition Slotted Aloha
《ZTE Communications》2020年第4期62-68,共7页SUN Jingyun LIU Zhen WU Yang 
The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded rando...
关键词:ALOHA coded random access MAC satellite network successive interference cancellation 
SIR approach in modeling data packets forwarding at a leaky bucket
《International Journal of Modeling, Simulation, and Scientific Computing》2020年第5期118-130,共13页Yaming Zhang Yaya H.Koura Yanyuan Su 
supported by the National Social Science Foundation of China(No.18BXW118).
When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective mo...
关键词:Packets transmission buffer occupancy SIR model congestion control 
Using Object Detection Network for Malware Detection and Identification in Network Traffic Packets被引量:6
《Computers, Materials & Continua》2020年第9期1785-1796,共12页Chunlai Du Shenghui Liu Lei Si Yanhui Guo Tong Jin 
This work was supported by Natural Science Foundation of China(61702013,61572492);the National Key research and Development Plan(Grant No.2018YFB0803504);Joint of Beijing Natural Science Foundation and Education Commission(KZ201810009011);Science and Technology Innovation Project of North China University of Technology(19XN108).
In recent years,the number of exposed vulnerabilities has grown rapidly and more and more attacks occurred to intrude on the target computers using these vulnerabilities such as different malware.Malware detection has...
关键词:Intrusion detection malicious payload deep learning object detection network 
检索报告 对象比较 聚类工具 使用帮助 返回顶部