Zobrazeno 1 - 10
of 491
pro vyhledávání: '"Nguyen, Tu N"'
With the rapid growth of threats, sophistication and diversity in the manner of intrusion, traditional belt barrier systems are now faced with a major challenge of providing high and concrete coverage quality to expand the guarding service market. Re
Externí odkaz:
http://arxiv.org/abs/2207.11818
Quantum networks are gaining momentum in finding applications in a wide range of domains. However, little research has investigated the potential of a quantum network framework to enable highly reliable communications. The goal of this work is to inv
Externí odkaz:
http://arxiv.org/abs/2207.11817
5G radio access network (RAN) slicing aims to logically split an infrastructure into a set of self-contained programmable RAN slices, with each slice built on top of the underlying physical RAN (substrate) is a separate logical mobile network, which
Externí odkaz:
http://arxiv.org/abs/2207.11822
There will be a fast-paced shift from conventional network systems to novel quantum networks that are supported by the quantum entanglement and teleportation, key technologies of the quantum era, to enable secured data transmissions in the next-gener
Externí odkaz:
http://arxiv.org/abs/2207.11821
5G radio access network (RAN) with network slicing methodology plays a key role in the development of the next-generation network system. RAN slicing focuses on splitting the substrate's resources into a set of self-contained programmable RAN slices.
Externí odkaz:
http://arxiv.org/abs/2207.11820
Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other Intelligent Transportation System (ITS) entities. Non-Ort
Externí odkaz:
http://arxiv.org/abs/2203.05152
Recently, many researchers have studied efficiently gathering data in wireless sensor networks to minimize the total energy consumption when a fixed number of data are allowed to be aggregated into one packet. However, minimizing the total energy con
Externí odkaz:
http://arxiv.org/abs/1910.05310
Modern malware evolves various detection avoidance techniques to bypass the state-of-the-art detection methods. An emerging trend to deal with this issue is the combination of image transformation and machine learning techniques to classify and detec
Externí odkaz:
http://arxiv.org/abs/1909.07227
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Chowdary, M. Kalpana1 (AUTHOR), Nguyen, Tu N.2 (AUTHOR), Hemanth, D. Jude1 (AUTHOR) judehemanth@karunya.edu
Publikováno v:
Neural Computing & Applications. Nov2023, Vol. 35 Issue 32, p23311-23328. 18p.