Search
Now showing items 1-6 of 6
Personalized Content Sharing via Mobile Crowdsensing
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Personalized content sharing will inevitably become one of the core applications of mobile Internet of Things. However, the existing strategies for content sharing are far from effective content personalization, since they ...
Applying artificial bee colony algorithm to the multidepot vehicle routing problem
(
John Wiley and Sons Ltd
, 2022 , Conference Paper)
With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ...
An Experimental Study of Two-way Ranging Optimization in UWB-based Simultaneous Localization and Wall-Mapping Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
In this paper, we propose a new ultra-wideband (UWB)-based simultaneous localization and wall-mapping (SLAM) system, which adopts two-way ranging optimization on UWB anchor and tag nodes to track the target's real-time ...
Dynamic Network Slicing and Resource Allocation for 5G-and-Beyond Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
5G networks are designed not only to transport data, but also to process them while supporting a vast number of services with different key Performance Indicators (KPIs). Network virtualization has emerged to enable this ...
PLS Performance Analysis of a Hybrid NOMA-OMA based IoT System with Mobile Sensors
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
With the advent of Internet of Things (IoT) systems, privacy and integrity of messages are becoming critical issues and are threatened, especially with mobile sensors. The broadcast nature of wireless communications increase ...
Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks
(
IEEE
, 2022 , Conference Paper)
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming attacks are among the most effective ...