Journal title
ISSN: 1999-5903    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 12 Part 1 Year 2020

18 articles in this issue 

Zhijun Wu, Rong Li, Panpan Yin and Changliang Li

Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization i... see more

Pags. 0 - 0  

Emilio Matricciani

According to altitude, the orbits of satellites constellations can be divided into geostationary Earth orbit (GEO), medium Earth orbit (MEO), and low Earth orbit (LEO) constellations. We propose to use a Walker star constellation with polar orbits, at any... see more

Pags. 0 - 0  

Zhijun Wu, Yun Zhang and Enzhong Xu

For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Data... see more

Pags. 0 - 0  

Keisuke Utsu, Mariko Abe, Shuji Nishikawa and Osamu Uchida

In the aftermath of disastrous events in Japan, safety information and rescue requests, as well as emergency alerts and damage situations, have been shared on Twitter. However, even victims who are familiar with smartphones or similar devices and social m... see more

Pags. 0 - 0  

Brandon Foubert and Nathalie Mitton

Wireless networks are now a part of the everyday life of many people and are used for many applications. Recently, new technologies that enable low-power and long-range communications have emerged. These technologies, in opposition to more traditional com... see more

Pags. 0 - 0  

You Guo, Hector Marco-Gisbert and Paul Keir

A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security products de... see more

Pags. 0 - 0  

Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed and Ali Kashif Bashir

Internet of Things (IoT)-based devices consist of wireless sensor nodes that are battery-powered; thus, energy efficiency is a major issue. IEEE 802.15.4-compliant IoT devices operate in the unlicensed Industrial, Scientific, and Medical (ISM) band of 2.4... see more

Pags. 0 - 0  

Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel

This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health ... see more

Pags. 0 - 0  

Jiajia Wang and Guangming Li

Bridge displacement measurement is an important area of bridge health monitoring, which can directly reflect whether the deformation of bridge structure exceeds its safety permission. Target tracking technology and Digital Image Correlation (DIC) are two ... see more

Pags. 0 - 0  

Jingpu Wang, Xin Song and Yatao Ma

Non-orthogonal multiple access (NOMA) has become a promising technology for 5G. With the support of effective resource allocation algorithms, it can improve the spectrum resource utilization and system throughput. In this article, a new resource allocatio... see more

Pags. 0 - 0  

Symeon Papavassiliou

The role of Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been instrumental in realizing the transition and vision “from black boxes to a white box towards facilitating 5G network architectures”. Though significant resea... see more

Pags. 0 - 0  

Samuel Yankson and Mahdi Ghamkhari

The automatic generation control mechanism in power generators comes into operation whenever an over-supply or under-supply of energy occurs in the power grid. It has been shown that the automatic generation control mechanism is highly vulnerable to load ... see more

Pags. 0 - 0  

Jianjun Lei, Ying Wang and Hong Yun

Legacy IEEE 802.11 Medium Access Control (MAC) adopts the Distributed Coordination Function (DCF) mechanism, which provides the same access opportunity for all contenders. However, in dense multi-rate Wireless Local Area Networks (WLANs), the pure distrib... see more

Pags. 0 - 0  

Wen An, Jun Jie Ma, Hong Yang Zhou, Hong Shan Chen, Xu Jun and Xu Jian

With the development of wireless communication technology and computer technology, more and more smart technologies have been applied in electricity distribution networks. This paper presents an adaptive current differential protection and fast auto-closi... see more

Pags. 0 - 0  

Jie Yang, Ziyu Pan and Lihong Guo

Due to the dense deployment of base stations (BSs) in heterogeneous cellular networks (HCNs), the energy efficiency (EE) of HCN has attracted the attention of academia and industry. Considering its mathematical tractability, the Poisson point process (PPP... see more

Pags. 0 - 0