In this paper, we consider a packet scheduler exploiting multiuser diversity in a wireless network with AMC (Adaptive Modulation and Coding), and propose a packet level performance...
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
A fractional Fourier transform (FrFT) based estimation method is introduced in this paper to analyze the long range dependence (LRD) in time series. The degree of LRD can be chara...