![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Improving byzantine fault tolerance based on stake evaluation and consistent hashing
In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring the normal operation of the system, particularly when facing with malicious nodes. However, challenges remain ...
-
Article
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems
The Grey Wolf Optimizer (GWO) is one of the more successful swarm-based intelligent algorithms in recent years, but the shortcomings of the Grey Wolf Optimizer are revealed as the problems handled become progr...
-
Article
Outdoor fine and coarse particles and hospital admissions for cardiovascular diseases: a large-scale case-crossover study
Despite high levels of air pollution in the Middle East, there are relatively few studies of its impacts on population health. In this study, associations between short-term exposure to PM2.5 and PM10-2.5 and hos...
-
Article
Deep logarithmic neural network for Internet intrusion detection
Intrusion detection is an important means to deal with network attacks. The traditional neural network needs to preprocess the sample data in intrusion detection, which may cause the loss in data accuracy, thu...
-
Article
Dynamic cloud resource management for efficient media applications in mobile computing environments
Single-instruction-set architecture (Single-ISA) heterogeneous multi-core processors (HMP) are superior to Symmetric Multi-core processors in performance per watt. They are popular in many aspects of the Inter...
-
Chapter and Conference Paper
PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks
Abundant experiments have shown that phantom source nodes cannot leave far away from the real source node. In this paper, we propose a novel position tracking based source location privacy (PTSLP) protection s...
-
Chapter and Conference Paper
Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks
Reprogramming is an important function required by wireless sensor networks (WSNs). Due to the openness of WSNs, more and more researchers pay attention to the security aspect of reprogramming, but confidentia...
-
Chapter and Conference Paper
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering
Intrusion detection systems (IDSs) play a significant role to effectively defend our crucial computer systems or networks against attackers on the Internet. Anomaly detection is an effective way to detect intr...
-
Article
Carotid Intima Media Thickness in Patients with Obstructive Sleep Apnea: Comparison with a Community-Based Cohort
The impact of obstructive sleep apnea (OSA) on the development of atherosclerotic cardiovascular disease (CVD) in the absence of overt CVD or risk factors is unclear. Our purpose was to assess whether patients...
-
Article
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
Designing a user authentication protocol with anonymity for the global mobility network (GLOMONET) is a difficult task because wireless networks are susceptible to attacks and each mobile user has limited powe...
-
Article
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks
Wireless networking is becoming an increasingly important and popular way of providing global information access to users on the move. One of the main challenges for seamless mobility is the availability of si...
-
Article
The Impact of CPAP on Cardiovascular Biomarkers in Minimally Symptomatic Patients with Obstructive Sleep Apnea: A Pilot Feasibility Randomized Crossover Trial
Background Previous, largely uncontrolled studies demonstrated the substantial effects of continuous positive airway pressure ventilation (CPAP) on a variety of physiologic and biochemica...
-
Chapter and Conference Paper
Call Admission Control for 3G CDMA Networks with Differentiated QoS
A call admission control (CAC) scheme for 3G wireless networks based on the estimated interference and differentiated quality of service (QoS) is proposed in this paper. In this CAC scheme, the interferences i...
-
Article
A refined model for performance analysis of output-buffered Banyan networks
In this paper, a new analytical model for performance analysis of output-buffered Banyan networks is proposed. In this model, we consider not only the number of packets stored in a buffer, but also the state o...