首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
轻工业   1篇
无线电   3篇
一般工业技术   1篇
自动化技术   2篇
  2024年   1篇
  2017年   1篇
  2016年   1篇
  2014年   1篇
  2012年   1篇
  2011年   1篇
  2006年   1篇
排序方式: 共有7条查询结果,搜索用时 0 毫秒
1
1.
This study introduces a comprehensive framework designed for detecting and mitigating fake and potentially threatening user communities within 5G social networks. Leveraging geo-location data, community trust dynamics, and AI-driven community detection algorithms, this framework aims to pinpoint users posing potential harm. Including an artificial control model facilitates the selection of suitable community detection algorithms, coupled with a trust-based strategy to effectively identify and filter potential attackers. A distinctive feature of this framework lies in its ability to consider attributes that prove challenging for malicious users to emulate, such as the established trust within the community, geographical location, and adaptability to diverse attack scenarios. To validate its efficacy, we illustrate the framework using synthetic social network data, demonstrating its ability to distinguish potential malicious users from trustworthy ones.  相似文献   
2.
We study the unique trust management, and more precisely reputation management and revocation of malicious nodes in the context of ad hoc networks used for emergency communications.Unlike in centralized systems, reputation management and revocation in ad hoc networks is non-trivial. This difficulty is due to the fact that the nodes have to collaboratively calculate the reputation value of a particular node and then revoke the node if the reputation value goes below a threshold. A major challenge in this scheme is to prevent a malicious node from discrediting other genuine nodes. The decision to revoke a node has to be communicated to all the nodes of the network. In traditional ad hoc networks the overhead of broadcasting the message throughout the network may be very high. We solve the problem of reputation management and node revocation in ad hoc networks of cell phones by using a threshold cryptography based scheme. Each node of the network would have a set of anonymous referees, which would store the reputation information of the node and issue reputation certificates to the node with timestamps. The misbehavior of a particular cell phone is reported to its anonymous referees, who issue certificates which reflect the positive and negative recommendations.  相似文献   
3.
The aim of the study is to present a frequency-selective evaluation of personal exposure induced by wireless operating networks in typical daily environments, derived by analysis of 1,905,162 samples of electric field strength, taken at a 5-s sampling interval. Measurements were collected with calibrated isotropic three-axial electric field probe personal exposure meters operating in the frequency range 88–5850 MHz. ‘’To estimate the electric field distribution below the measurement equipment detection limit, the robust regression on order statistics method was applied, enabling determination of mean values of electric field strength per wireless technology for: home, office, transport, outdoor, and leisure environments. The highest value of total electric field strength exposure is obtained on public transport (buses) followed by coffee shops and outdoor environments, whereas the lowest values are captured in home and office environments. Most of the mean values of the electric field were less than 0.06 V/m. Furthermore, the analyses between the contribution of uplink and downlink exposures for operating wireless cellular networks are given, including a comparison of uplink and downlink electric field levels from other countries. Readings of the 24-h personal-exposure pattern, reveal the GSM + UMTS downlink and Wi-Fi as dominant exposure contributors. The results of this study show that spatial and temporal exposure levels in Kosovo are comparable to those reported for other European countries and far below the international safety guidelines and exposure limits.  相似文献   
4.
5.
The authors present the results of a year-long survey of the indoor radon concentration levels in the FYR of Macedonia. A total number of 437 dwellings in eight statistical regions were subject to radon concentration measurements by using CR-39 track detectors. The annual mean indoor radon concentration in each measuring site was estimated from the four individual measurements with 3 months duration. The measuring period was from December 2008 to December 2009. The distribution of the results was nearly log-normal. The arithmetic and geometric mean values of the annual mean value of radon concentration were estimated to be 105 ± 84 and 84*/1.9 Bq m(-3), respectively. The annual effective dose due to indoor exposure to radon in the dwellings was estimated to be 2.1*/1.9 mSv y(-1).  相似文献   
6.
The benefit of disaccharide protectants for maintaining viability and β-glucosidase activity of Bifidobacterium infantis UV16PR during freeze-drying and storage in different food matrices was investigated. Protectants used were cellobiose, lactose, sucrose and trehalose.  相似文献   
7.
Inter Vehicle Communications (IVC) have the potential to significatively increase the safety in our highways. In such communications, the quality and reliability of service becomes a very critical issue. In particular, it is important that in case of emergencies, when the inter vehicle traffic increases exponentially, the message delay should be kept low. We present a reliable hierarchical routing protocol that uses load balancing to keep message delay low even in presence of high level of traffic. Our protocol is based on geographical routing. The protocol is designed for highway travelers but can be used in other mobile ad-hoc scenarios. The highway is divided in virtual cells, which moves as the vehicles moves. The cell members might choose one or more Cell_Leaders that will behave for a certain time interval as Base Stations. We assume that every node knows its geographical position, given by Global Positioning System (GPS) or some other method. Cell_Leaders form a virtual backbone that is used to forward messages among nodes on different cells. The traffic is distributed among Cell_Leaders in order to optimize the communication delay. We study the effect of load balancing in minimizing delay. Our simulation results show that our proposed protocol improves the delay and the network utilization compared to existing inter vehicles protocols.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号