While \"Big data\" has become a highlighted buzzword since last year, \"Big data mining\", i.e., mining from big data, has almost immediately followed up as an emerging, interrelated research area. This paper provides an overview of big data mining and discusses the related challenges and the new opportunities. The discussion ...Download Now
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks the authors introduce a location-aware, trust-based ...Download Now
In this paper the authors use ternary representation of numbers for compressing text data. They use a binary map for ternary digits and introduce a way to use the binary 11-pair, which has never been use for coding data before, and they further use 4-Digits ternary representation of alphabet with ...Download Now
IEEE 802.11b devices operate in the 2.4 GHz ISM band the United States. Because of this, 802.11b devices are susceptible to interference from a multitude of sources such as microwave ovens and cordless phones. Interference from other devices can lead to transmission failures and degraded performance. Wireless devices may be ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?