In the world of wireless sensor networks(WSNs),optimizing performance and extending network lifetime are critical goals.In this paper,we propose a new model called DTLR-Net(Deep Temporal LSTM Regression Network)that e...
supportted by the King Khalid University through the Large Group Project(No.RGP.2/312/44).
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not ...
supported by Chongqing Key Laboratory of Mobile Communications Technology(Grant No.cqupt-mct-202203)。
Delay/disruption tolerant networking(DTN)is proposed as a networking architecture to overcome challenging space communication characteristics for reliable data transmission service in presence of long propagation dela...
The growth in wireless technologies applications makes the necessity of providing a reliable communication over wireless networks become obvious.Guaranteeing real time communication in wireless medium poses a signific...
This study is supported through Taif University Researchers Supporting Project Number(TURSP-2020/150),Taif University,Taif,Saudi Arabia.
Today,Internet of Things(IoT)is a technology paradigm which convinces many researchers for the purpose of achieving high performance of packets delivery in IoT applications such as smart cities.Interconnecting various...
supported in part by National Natural Science Foundation of China under Grant Nos.61872311,61973261 and 62006069;supported in part by MEXT,Japan.Also。
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate manner....
Projects supported by the National Natural Science Foundation of China(Grant Nos.11732010,11972251).
This paper presents experimental measurements by the time-resolved particle image velocimetry(TR-PIV)for the turbulent boundary layer(TBL)over the smooth surface,the superhydrophobic(SH)surface,and the superhydrophobi...
The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded rando...
supported by the National Social Science Foundation of China(No.18BXW118).
When network users are intensively interacting during rush hour,avoiding data loss and latency is a concern in guaranteeing segment reliability.Implementing a leaky bucket could be needed to achieve flows effective mo...
This work was supported by Natural Science Foundation of China(61702013,61572492);the National Key research and Development Plan(Grant No.2018YFB0803504);Joint of Beijing Natural Science Foundation and Education Commission(KZ201810009011);Science and Technology Innovation Project of North China University of Technology(19XN108).
In recent years,the number of exposed vulnerabilities has grown rapidly and more and more attacks occurred to intrude on the target computers using these vulnerabilities such as different malware.Malware detection has...