Search
Now showing items 181-190 of 211
DAGIoV: A Framework for Vehicle to Vehicle Communication Using Directed Acyclic Graph and Game Theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication ...
Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid
(
IEEE Computer Society
, 2020 , Article)
In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, and mutual authentication, with reduced energy, communicational, and computational overheads, is proposed for resource-constrained ...
Power Allocation for D2D Communications with SWIPT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Power allocation plays a vital role in coordinating interference between Device-to-Device (D2D) and cellular communications, and when power allocation meets simultaneous wireless information and power transfer (SWIPT), the ...
Reliable Federated Learning for Mobile Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Federated learning, as a promising machine learning approach, has emerged to leverage a distributed personalized dataset from a number of nodes, for example, mobile devices, to improve performance while simultaneously ...
Enabling Efficient Coexistence of DSRC and C-V2X in Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Radio access technologies, such as C-V2X and DSRC, have been used to support robust communication in connected vehicles scenarios. However, existing studies mostly dealt with homogenous vehicular networks, where coexistence ...
An energy-balanced trust cloud migration scheme for underwater acoustic sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
As a candidate trust management scheme, trust models based on the cloud theory are always taken into account when detecting malicious attacks in Underwater Acoustic Sensor Networks (UASNs). To evaluate the trust values of ...
A Node Location Algorithm Based on Node Movement Prediction in Underwater Acoustic Sensor Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Aiming at the problems of the low mobility, low location accuracy, high communication overhead, and high energy consumption of sensor nodes in underwater acoustic sensor networks, the MPL (movement prediction location) ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...
Peak Extraction Passive Source Localization Using a Single Hydrophone in Shallow Water
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this work, we use the acoustic ray model to study passive source localization problems using a single hydrophone for shallow water waveguides. It has been found that conventional matched field processing, which requires ...