Search
Now showing items 1-6 of 6
Smart Edge Healthcare Data Sharing System
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Smart health systems improve the efficiency of healthcare infrastructures and biomedical systems by integrating information and technology into health and medical practices. However, reliability, scalabilty and latency are ...
Iterative per Group Feature Selection for Intrusion Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ...
Blockchain Based Decentralized Trust Management framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The blockchain is a storage technology and transmission of information, transparent, secure, and operating without central control. In this paper, we propose a new decentralized trust management and cooperation model where ...
CE-D2D: Collaborative and Popularity-aware Proactive Chunks Caching in Edge Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Leveraging video caching to collaborative Mobile Edge Computing (MEC) servers is an emerging paradigm, where cloud computing services are extended to edge networks to allocate multimedia contents close to end-users. However, ...
On the effect of proportional fairness in energy transfer for wireless powered communication networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Wireless powered communication network (WPCN) is an emerging area of research where energy is transferred from the access point to the mobile terminals in the downlink and information is transferred in the uplink. In the ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...