Search
Now showing items 241-250 of 326
Carrier aggregation for LTE-advanced: Uplink multiple access and transmission enhancement features
(2013 , Article)
Multiple access and transmission enhancement in support of carrier aggregation techniques has been actively studied in the 3GPP LTEAdvanced standardization process of the nextgeneration mobile broadband communication ...
A measurement study on the topologies of BitTorrent networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
(
Elsevier Ltd
, 2021 , Article)
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ...
Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid
(
IEEE Computer Society
, 2020 , Article)
In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, and mutual authentication, with reduced energy, communicational, and computational overheads, is proposed for resource-constrained ...
DCNN-GA: A Deep Neural Net Architecture for Navigation of UAV in Indoor Environment
(2021 , Article)
The applications of unmanned aerial vehicles (UAVs) in military, intelligent transportation, agriculture, rescue operations, natural environment mapping, and many other allied domains has increased exponentially during the ...
Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the rapid development of smart cities, various types of sensors can rapidly collect a large amount of data, and it becomes increasingly important to discover effective knowledge and process information from massive ...
RobustTrust - A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. ...
Security Analysis of a Space-Based Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the gradual deployment of the spacebased wireless network, security risks in the data communication between satellites and even the internal structure of a satellite become extremely important. In this article, we use ...
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...