Search
Now showing items 61-70 of 174
Optimal resource allocation for green and clustered video sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
Wireless video sensor networks (WVSNs) are opening the door for many applications, such as industrial surveillance, environmental tracking, border security, and infrastructure health monitoring. In WVSN, energy conservation ...
Distributed cross-layer optimization for healthcare monitoring applications
(
IEEE Computer Society
, 2014 , Conference Paper)
Mobile Health (mHealth) systems leverage wireless and mobile communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning. Body Area Sensor ...
Decentralized throughput maximization in cognitive radio wireless mesh networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
Scheduling and spectrum allocation are tasks affecting the performance of cognitive radio wireless networks, where heterogeneity in channel availability limits the performance and poses a great challenge on protocol design. ...
Up and away: A visually-controlled easy-to-deploy wireless UAV Cyber-Physical testbed
(
IEEE Computer Society
, 2014 , Conference Paper)
Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate ...
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Efficient and Fair Throughput-Optimal Scheduling in Buffer-Aided Relay-Based Cellular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
In this letter, we study throughput-optimal scheduling policies in single-path buffer-aided relay networks, where the packets of a user travel one fixed path from the source to the destination and do not require routing. ...
Multimodal deep learning approach for Joint EEG-EMG Data compression and classification
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
In this paper, we present a joint compression and classification approach of EEG and EMG signals using a deep learning approach. Specifically, we build our system based on the deep autoencoder architecture which is designed ...
On the effect of proportional fairness in energy transfer for wireless powered communication networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Wireless powered communication network (WPCN) is an emerging area of research where energy is transferred from the access point to the mobile terminals in the downlink and information is transferred in the uplink. In the ...