Search results for "tiedonsiirto"
showing 7 items of 67 documents
Multi-hop D2D Communications with Network Coding : From A Performance Perspective
2019
Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communication system. In the system, toward jointly considering the impact of interference and network traffic conditions on the quality of D2D communications, various channel fading models and traffic models are investigated, and the packet loss probability of D2D links is meticulously computed using these models. With the packet loss probability of D2D links, the general closed-form expressions of end-to-end packet loss probability (E2EPLP) of the system with the presence (or absence) o…
Managing mobility in an always-best-connected IP network
2013
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
2015
Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast to detrimental the networks and hosts. Due to these reasons real-time monitoring, processing and intrusion detection are now among the key features of NIDS. Traditional types of intrusion detection systems such as signature base IDS are not able detect intrusions with new and complex strategies. Now days, automatic traffic analysis and anomaly intrusion detection became more efficient in field of network security however they suffer from high number of false alarms. Among all …
Communication in the software vulnerability reporting process
2003
Energy Efficient Optimization for Wireless Virtualized Small Cell Networks With Large-Scale Multiple Antenna
2017
Wireless network virtualization is envisioned as a promising framework to provide efficient and customized services for next-generation wireless networks. In wireless virtualized networks (WVNs), limited radio resources are shared among different services providers for providing services to different users with heterogeneous demands. In this paper, we propose a resource allocation scheme for an orthogonal frequency division multiplexing-based WVN, where one small cell base station equipped with a large number of antennas serves the users with different service requirements. In particular, with the objective to obtain the energy efficiency in the uplink, a joint power, subcarrier, and antenn…
Service-Oriented Wireless Virtualized Networks: An Intelligent Resource Management Approach
2022
Resource Allocation and Computation Offloading for Wireless Powered Mobile Edge Computing
2022
In this paper, we investigate a resource allocation and computation offloading problem in a heterogeneous mobile edge computing (MEC) system. In the considered system, a wireless power transfer (WPT) base station (BS) with an MEC sever is able to deliver wireless energy to the mobile devices (MDs), and the MDs can utilize the harvested energy for local computing or task offloading to the WPT BS or a Macro BS (MBS) with a stronger computing server. In particular, we consider that the WPT BS can utilize full- or half-duplex wireless energy transmission mode to empower the MDs. The aim of this work focuses on optimizing the offloading decision, full/half-duplex energy harvesting mode and energ…