Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
This paper presents a novel approach to control the augmented reality (AR) objects robustly in a marker-less AR system by fingertip tracking and hand pattern recognition. It is kn...
In this paper, two selection relaying schemes are proposed and compared with each other in terms of packet error rate (PER) and diversity order. Moreover, the comparison is perfor...
Cognitive Radio is an advanced enabling technology for the efficient utilization of vacant spectrum due to its ability to sense the spectrum environment. It is important to determ...
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
In this paper, we analyze the impact of different frame types on self-similarity and burstiness characteristics of the aggregated frame traffic from a real 802.11 wireless local a...
Xiaohu Ge, Cheng-Xiang Wang, Yang Yang, Lei Shu, C...
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
The low-rate (LR) UWB is a promising technology for the ubiquitous sensor network (USN) due to its extremely low power consumption and simple transceiver implementation. However t...