Learn More
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and(More)
In this paper, we investigate the problem of achieving proportional fairness via access point (AP) association in multirate WLANs. This problem is formulated as a nonlinear programming with an objective function of maximizing the total user bandwidth utilities in the whole network. Such a formulation jointly considers fairness and AP selection. We first(More)
With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Network Intrusion Detection / Prevention Systems NIDS.(More)
Privacy is one of the most important issues in social social network data sharing. Structure anonymization is a effective method to protect user from being reidentfied through graph modifications. The data utility of the distorted graph structure after the anonymization is a really severe problem. Reducing the utility loss is a new measurement while(More)
Keywords: Underground pipelines Leakage detection and localization Wireless sensor networks Magnetic induction (MI) communications a b s t r a c t Underground pipelines constitute one of the most important ways to transport large amounts of fluid (e.g. oil and water) through long distances. However, existing leakage detection techniques do not work well in(More)
—A constantly available control channel facilitates control message exchange and spectrum coordination in cognitive radio (CR) ad hoc networks. When a dedicated control channel is unavailable, a control channel must be dynamically allocated in licensed channels and vacated for the presence of primary users (PUs). As a result, the establishment of such a(More)
As serious natural disasters, sandstorms have caused massive damages to the natural environment, national economy, and human health in the Middle East, Northern Africa, and Northern China. To avoid such damages, wireless sensor networks (WSNs) can be deployed in the regions where sandstorms generally originate so that sensor nodes can col-laboratively(More)