Skip to Content

2,423 Results Found

  • Article
  • Open Access
1 Citations
1,702 Views
13 Pages

A Layer-Based Relaxation Approach for Service Network Design

  • Xudong Diao,
  • Ai Gao,
  • Xin Jin and
  • Hui Chen

13 October 2022

Service-network design in transportation applications has attracted much scientific attention due to the rapid growth of online shopping. Practical service-network planning tools could help express service providers in minimizing the total cost while...

  • Article
  • Open Access
2 Citations
1,256 Views
19 Pages

Using DL Models in the Service Layer to Enhance the Fault Tolerance of IoT Networks

  • Sastry Kodanda Rama Jammalamadaka,
  • Bhupati Chokara,
  • Sasi Bhanu Jammalamadaka and
  • Balakrishna Kamesh Duvvuri

5 November 2024

In an IoT network, the networked servers form a service layer, providing services to the users and the devices. The request to the service servers is routed through the gateway on one side of the services layer and the networked controllers on the ot...

  • Article
  • Open Access
17 Citations
3,928 Views
29 Pages

Application Layer-Based Denial-of-Service Attacks Detection against IoT-CoAP

  • Sultan M. Almeghlef,
  • Abdullah AL-Malaise AL-Ghamdi,
  • Muhammad Sher Ramzan and
  • Mahmoud Ragab

Internet of Things (IoT) is a massive network based on tiny devices connected internally and to the internet. Each connected device is uniquely identified in this network through a dedicated IP address and can share the information with other devices...

  • Article
  • Open Access
1 Citations
1,999 Views
14 Pages

Two-Layer Matrix Factorization and Multi-Layer Perceptron for Online Service Recommendation

  • Shudi Bao,
  • Tiantian Wang,
  • Liliang Zhou,
  • Guilan Dai,
  • Geng Sun and
  • Jun Shen

22 July 2022

Service recommendation is key to improving users’ online experience. The development of the Internet has accelerated the creation of many services, and whether users can obtain good experiences among the massive number of services mainly depend...

  • Article
  • Open Access
6 Citations
3,908 Views
24 Pages

A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services

  • Ivan Vidal,
  • Borja Nogales,
  • Diego Lopez,
  • Juan Rodríguez,
  • Francisco Valera and
  • Arturo Azcorra

Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provisi...

  • Feature Paper
  • Article
  • Open Access
2,900 Views
14 Pages

29 May 2021

This paper focuses on preventing forms of social dysfunction such as invasions of privacy and stalking by understanding the diversified situation of the rapidly increasing number of social media users who use social media services, which are various...

  • Article
  • Open Access
6 Citations
8,136 Views
23 Pages

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection

  • Aleksandra Mileva,
  • Aleksandar Velinov,
  • Vesna Dimitrova,
  • Luca Caviglione and
  • Steffen Wendzel

25 January 2022

The DICOM (Digital Imaging and COmmunication in Medicine) standard provides a framework for a diagnostically-accurate representation, processing, transfer, storage and display of medical imaging data. Information hiding in DICOM is currently limited...

  • Article
  • Open Access
2 Citations
3,918 Views
15 Pages

25 October 2021

Chatbot technologies have made our lives easier. To create a chatbot with high intelligence, a significant amount of knowledge processing is required. However, this can slow down the reaction time; hence, a mechanism to enable a quick response is nee...

  • Article
  • Open Access
6 Citations
1,727 Views
28 Pages

10 September 2024

Researchers have proposed the dynamic heterogeneous redundancy (DHR) architecture, which integrates dynamic, heterogeneous, redundant, and closed-loop feedback elements into the system, to fortify the reliability of the railway passenger service syst...

  • Article
  • Open Access
9 Citations
3,267 Views
25 Pages

Enhancing the Fault Tolerance of a Multi-Layered IoT Network through Rectangular and Interstitial Mesh in the Gateway Layer

  • Sastry Kodanda Rama Jammalamadaka,
  • Bhupati Chokara,
  • Sasi Bhanu Jammalamadaka,
  • Balakrishna Kamesh Duvvuri and
  • Rajarao Budaraju

Most IoT systems designed for the implementation of mission-critical systems are multi-layered. Much of the computing is done in the service and gateway layers. The gateway layer connects the internal section of the IoT to the cloud through the Inter...

  • Article
  • Open Access
5 Citations
3,032 Views
30 Pages

15 May 2021

Antarctica is a key location for many research fields. The lack of telecommunication systems that interconnect remote base camps hardens the possibility of building synergies among different polar research studies. This paper defines a network archit...

  • Article
  • Open Access
33 Citations
6,896 Views
16 Pages

The Impacts of Animal Health Service Providers on Antimicrobial Use Attitudes and Practices: An Examination of Poultry Layer Farmers in Ghana and Kenya

  • Kofi Afakye,
  • Stella Kiambi,
  • Eric Koka,
  • Emmanuel Kabali,
  • Alejandro Dorado-Garcia,
  • Ann Amoah,
  • Tabitha Kimani,
  • Benjamin Adjei and
  • Mark A Caudell

International organizations and governments have argued that animal health service providers can play a vital role in limiting antimicrobial resistance by promoting the prudent use of antimicrobials. However, there is little research on the impact of...

  • Article
  • Open Access
13 Citations
3,661 Views
12 Pages

26 March 2020

The service life of concretes exposed to sulfate decreases as the concrete body expands due to the formation of gypsum and ettringite. Bacteria-based repair coating layers, which have been studied lately, are aerobic and very effective on the sulfate...

  • Article
  • Open Access
8 Citations
3,849 Views
20 Pages

A General Cross-Layer Cloud Scheduling Framework for Multiple IoT Computer Tasks

  • Guanlin Wu,
  • Weidong Bao,
  • Xiaomin Zhu and
  • Xiongtao Zhang

23 May 2018

The diversity of IoT services and applications brings enormous challenges to improving the performance of multiple computer tasks’ scheduling in cross-layer cloud computing systems. Unfortunately, the commonly-employed frameworks fail to adapt...

  • Article
  • Open Access
3 Citations
1,755 Views
13 Pages

8 July 2024

A foundation pit is constructed in the floodplain of Yangtze River, and a deep and thick layer of large-particle pebble gravel exists below the base slab, thus forming a connected supply channel with the adjacent Yangtze River. The large water volume...

  • Article
  • Open Access
8 Citations
2,911 Views
11 Pages

Effect of Asphalt Pavement Base Layers on Transverse Shrinkage Cracking Characteristics

  • Mingming Xing,
  • Hongwei Yang,
  • Zhenguo Zhao and
  • Tengjiang Yu

26 April 2023

Transverse shrinkage cracking is considered to be one of the main factors leading to the degradation of sustainable service performance for asphalt pavement, but the effect of base layers on it is rarely studied. To investigate the effect of asphalt...

  • Article
  • Open Access
3 Citations
2,921 Views
15 Pages

14 October 2022

The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols. The primary focus of defending agains...

  • Article
  • Open Access
22 Citations
4,183 Views
16 Pages

6 November 2019

The study aims at lowering the pressure drop and extending the service life at a given set of filter materials implementing a space between the filter layers. As design factors, the web-to-web space was implemented by inserting either a bulk air gap...

  • Article
  • Open Access
654 Views
35 Pages

6 November 2025

In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users&rsquo...

  • Article
  • Open Access
1 Citations
2,251 Views
29 Pages

24 December 2024

The article focuses on the identification and mapping of cultural ecosystem service (CES) resources in the territory of the Local Action Group Lednice–Valtice Area (LAG LVA). The Consolidated Layer of Ecosystems (CLE) was used for mapping, and...

  • Article
  • Open Access
5 Citations
3,602 Views
31 Pages

Network caching is a technique used to speed-up user access to frequently requested contents in complex data networks. This paper presents a two-layer overlay network caching system for content distribution. It is used to define some caching scenario...

  • Article
  • Open Access
1 Citations
1,431 Views
21 Pages

3 July 2024

To address the issue of high auxiliary service costs caused by the grid connection of new energy generation, a dual layer optimization scheduling method for high penetration new energy power grids is proposed, taking into account the auxiliary servic...

  • Article
  • Open Access
2 Citations
2,659 Views
32 Pages

21 December 2024

Urbanization exerts significant stress on urban river ecosystems, leading to their degradation and the loss of environmental functions. Several studies have focused on restoring these urban rivers to enhance environmental quality and contribute to ov...

  • Article
  • Open Access
2 Citations
1,918 Views
11 Pages

Cross-Layer Optimization-Based Asymmetric Medical Video Transmission in IoT Systems

  • Yu Wang,
  • Weijia Han,
  • Xiao Ma,
  • Qiuzhi Wang and
  • Fengsen Chen

19 November 2022

At present, Internet of Things (IoT) networks are attracting much attention since they provide emerging opportunities and applications. In IoT networks, the asymmetric and symmetric studies on medical and biomedical video transmissions have become an...

  • Feature Paper
  • Review
  • Open Access
1 Citations
3,898 Views
19 Pages

16 August 2021

Caching has attracted much attention recently because it holds the promise of scaling the service capability of radio access networks (RANs). We envision that caching will ultimately make next-generation RANs more than bit-pipelines and emerge as a m...

  • Article
  • Open Access
26 Citations
7,147 Views
27 Pages

31 March 2024

The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead...

  • Article
  • Open Access
260 Views
31 Pages

Privacy-Preserving User Profiling Using MLP-Based Data Generalization

  • Dardan Maraj,
  • Renato Šoić,
  • Antonia Žaja and
  • Marin Vuković

14 January 2026

The rapid growth in Internet-based services has increased the demand for user data to enable personalized and adaptive digital experiences. These services typically require users to disclose various types of personal information, which are organized...

  • Review
  • Open Access
20 Citations
10,957 Views
56 Pages

Fifty Years of Fixed Optical Networks Evolution: A Survey of Architectural and Technological Developments in a Layered Approach

  • Dimitris Uzunidis,
  • Michael Logothetis,
  • Alexandros Stavdas,
  • David Hillerkuss and
  • Ioannis Tomkos

11 November 2022

Over the past fifty years, telecommunications has transformed, in an unprecedented manner, the way we live, work and communicate. For telecommunications, fixed networks are the one pillar and wireless networks the other. The wireless networks and the...

  • Article
  • Open Access
3 Citations
3,191 Views
21 Pages

4 May 2022

We propose a multi-layer data mining architecture for web services discovery using word embedding and clustering techniques to improve the web service discovery process. The proposed architecture consists of five layers: web services description and...

  • Article
  • Open Access
1,495 Views
25 Pages

24 May 2024

With the increasing demand for data exchange between nearby devices in proximity-based services, enhancing the security of wireless mutual broadcast (WMB) networks is crucial. However, WMB networks are inherently vulnerable to eavesdropping due to th...

  • Article
  • Open Access
10 Citations
7,320 Views
28 Pages

20 July 2015

Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new ser...

  • Article
  • Open Access
9 Citations
3,165 Views
16 Pages

RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks

  • Mahmoud A. Shawky,
  • Syed Tariq Shah,
  • Qammer H. Abbasi,
  • Mohamed Hussein,
  • Muhammad A. Imran,
  • Syed Faraz Hasan,
  • Shuja Ansari and
  • Ahmad Taha

19 April 2023

Wireless communication has become an integral part of modern vehicles. However, securing the information exchanged between interconnected terminals poses a significant challenge. Effective security solutions should be computationally inexpensive, ult...

  • Article
  • Open Access
570 Views
24 Pages

FloorTag: A Hybrid Indoor Localization System Based on Floor-Deployed Visual Markers and Pedometer Integration

  • Gaetano Carmelo La Delfa,
  • Marta Plaza-Hernandez,
  • Javier Prieto,
  • Albano Carrera and
  • Salvatore Monteleone

7 December 2025

With the widespread adoption of smartphones and wearable devices, localization systems have become increasingly important in modern society. While Global Positioning System (GPS) technology is widely accepted as a standard outdoors, accurately determ...

  • Article
  • Open Access
3 Citations
3,486 Views
16 Pages

Quantifying the Density of mmWave NR Deployments for Provisioning Multi-Layer VR Services

  • Vitalii Beschastnyi,
  • Daria Ostrikova,
  • Roman Konyukhov,
  • Elizaveta Golos,
  • Alexander Chursin,
  • Dmitri Moltchanov and
  • Yuliya Gaidamaka

The 5G New Radio (NR) technology operating in millimeter wave (mmWave) frequency band is designed for support bandwidth-greedy applications requiring extraordinary rates at the access interface. However, the use of directional antenna radiation patte...

  • Feature Paper
  • Article
  • Open Access
6 Citations
3,433 Views
22 Pages

9 December 2020

Recycled aggregate concrete (RAC), i.e., concrete produced with recycled concrete aggregate (RCA) has been heavily investigated recently, and the structural design of RAC is entering into design codes. Nonetheless, the service load deflection behavio...

  • Article
  • Open Access
1 Citations
1,532 Views
18 Pages

30 September 2025

Facial recognition systems are increasingly used for authentication across domains such as finance, e-commerce, and public services, but their growing adoption raises significant concerns about spoofing attacks enabled by printed photos, replayed vid...

  • Article
  • Open Access
12 Citations
3,806 Views
26 Pages

Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection

  • Abdulrahman A. Alshdadi,
  • Abdulwahab Ali Almazroi,
  • Nasir Ayub,
  • Miltiadis D. Lytras,
  • Eesa Alsolami and
  • Faisal S. Alsubaei

5 December 2024

The increasing threat of Distributed DDoS attacks necessitates robust, big data-driven methods to detect and mitigate complex Network and Transport Layer (NTL) attacks. This paper proposes EffiGRU-GhostNet, a deep-learning ensemble model for high-acc...

  • Proceeding Paper
  • Open Access
5,591 Views
11 Pages

5 September 2025

Quick User Datagram Protocol Internet Connection (QUIC) is a modern transport protocol leveraging the User Datagram Protocol (UDP) to improve latency, security, and mobility. In this study, we analyzed QUIC traffic by uploading a 10 MB file under var...

  • Article
  • Open Access
707 Views
23 Pages

Low-Carbon Greening Strategies for Expressway Service Area: Optimizing Carbon Sink Design Across Diverse Climate Zones

  • Liang Zhao,
  • Xianglin Liu,
  • Yahui Gao,
  • Tianhao Shi,
  • Wenyu Li,
  • Meng Tang,
  • Yunyi Huang and
  • Tingzhen Ming

2 September 2025

The increasing demand for sustainable development and carbon neutrality highlights the need to improve the energy efficiency of infrastructure, particularly in highway service areas. This study explores the application of green roofs as a low-carbon...

  • Article
  • Open Access
6 Citations
4,344 Views
16 Pages

22 December 2022

Advances in the future communication technologies and capabilities of new services in heterogeneous network systems have increased the need for modelling and analysing various aspects of both the resilience of networked systems and usability from the...

  • Article
  • Open Access
114 Citations
18,976 Views
30 Pages

8 April 2010

Wireless Sensor Networks (WSNs) are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and ac...

  • Article
  • Open Access
7 Citations
6,374 Views
13 Pages

With the proliferation of heterogeneous networks, there is a need to provide multimedia stream services in a sustainable manner. It is especially critical to maintain the Quality of Service (QoS) standards. Existing multimedia streaming services have...

  • Article
  • Open Access
11 Citations
6,083 Views
15 Pages

12 May 2017

Space agencies, international and national organisations and institutions recognize the importance of regularly updated and homogenized land cover information, in the context of both nomenclature and spatial resolution. Moreover, ensuring credibility...

  • Article
  • Open Access
12 Citations
5,012 Views
23 Pages

20 November 2018

In order to improve the management mechanisms of the electric energy transport infrastructures, the smart grid networks have associated data networks that are responsible for transporting the necessary information between the different elements of th...

  • Article
  • Open Access
2 Citations
4,240 Views
32 Pages

Enhancing Cloud Computing Analysis: A CCE-Based HTTP-GET Log Dataset

  • Ziyad R. Alashhab,
  • Mohammed Anbar,
  • Shaza Dawood Ahmed Rihan,
  • Basim Ahmad Alabsi and
  • Karamath Ateeq

9 August 2023

The Hypertext Transfer Protocol (HTTP) is a common target of distributed denial-of-service (DDoS) attacks in today’s cloud computing environment (CCE). However, most existing datasets for Intrusion Detection System (IDS) evaluations are not sui...

  • Article
  • Open Access
3 Citations
3,108 Views
24 Pages

Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol

  • Sultan M. Almeghlef,
  • Abdullah AL-Malaise AL-Ghamdi,
  • Muhammad Sher Ramzan and
  • Mahmoud Ragab

21 June 2023

This paper discusses the Internet of Things (IoT) and the security challenges associated with it. IoT is a network of interconnected devices that share information. However, the low power and resources of IoT devices make them vulnerable to attacks....

  • Article
  • Open Access
3 Citations
1,016 Views
13 Pages

The Optimal Configuration of Energy Storage Capacity Based on the NSGA-II Algorithm and Electrochemical Energy Storage Operational Modes

  • Guirong Hu,
  • Xingxiao Zhao,
  • Shidong Cheng,
  • Qiang Zhang,
  • Qi Zhang,
  • Jingjing Bai and
  • Linjun Shi

8 May 2025

Due to the intermittency and volatility of renewable energy generation, the safe and stable operation of the power system is affected, leading to issues such as frequency deviations in the grid and voltage exceeding limits during grid connection. The...

  • Article
  • Open Access
19 Citations
2,662 Views
14 Pages

Service Behavior of Nitride Layers of Steels for Military Applications

  • Jiri Prochazka,
  • Zdenek Pokorny and
  • David Dobrocky

14 October 2020

Steels which are utilized in the manufacturing of specific parts of military technology such as crankshafts of engines in heavy-duty vehicles or barrels of guns must be subsequently modified by heat treatment according to the requirements of customer...

  • Article
  • Open Access
2,045 Views
22 Pages

A Reliable Routing Algorithm Based on Path Satisfaction in the Energy Internet

  • Baoju Liu,
  • Xiangqian Wei,
  • Haifeng Hu,
  • Peng Yu and
  • Lei Shi

To meet the ever-increasing strict transmission requirements of services in the Energy Internet (EI), reliable routing algorithms for service are necessary. Most of the existing routing algorithms in the Internet Protocol (IP) layer concentrate on se...

  • Article
  • Open Access
40 Citations
6,073 Views
13 Pages

Residual Fatigue Properties of Asphalt Pavement after Long-Term Field Service

  • Peide Cui,
  • Yue Xiao,
  • Mingjing Fang,
  • Zongwu Chen,
  • Mingwei Yi and
  • Mingliang Li

25 May 2018

Asphalt pavement is widely used for expressways due to its advantages of flexibility, low cost, and easy maintenance. However, pavement failures, including cracking, raveling, and potholes, will appear after long-term service. This research evaluated...

of 49