—In this paper, we investigate the maximization of the coverage time for a clustered wireless sensor network (WSN) by optimal balancing of power consumption among cluster heads (...
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Abstract—Today’s wirelessly networked embedded systems underlie a vast array of electronic devices, performing computation, communication, and input/output. A major design goal...
— Radio measurements play a crucial role in mobile wireless networks as they are input of Radio Resource Management (RRM) mechanisms, needed to assess mobile network reliability ...
Afef Ben Hadj Alaya-Feki, Alain Le Cornec, Eric Mo...
Abstract—This paper studies a constrained optical signal-tonoise ratio (OSNR) optimization problem in optical networks from the perspective of system performance. A system optimi...