Search
Now showing items 11-20 of 20
A method of chained recommendation for charging piles in internet of vehicles
(
Springer
, 2021 , Article)
With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ...
A co-design-based reliable low-latency and energy-efficient transmission protocol for uwsns
(
MDPI AG
, 2020 , Article)
Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. ...
An intelligent data uploading selection mechanism for offloading uplink traffic of cellular networks
(
MDPI AG
, 2020 , Article)
Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading ...
Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking
(
Elsevier B.V.
, 2020 , Article)
With the increasingly huge mobile traffic, numerous mobile operators try to seek some ways to alleviate the situation, such as expanding the LTE (Long Term Evolution) system into unlicensed spectrums. However, LTE-U (LTE ...
An adaptive network coding scheme for multipath transmission in cellular-based vehicular networks
(
MDPI AG
, 2020 , Article)
With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
(
Science in China Press
, 2020 , Article)
The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social networks as its main design element. As one of the most critical components ...
System log detection model based on conformal prediction
(
MDPI AG
, 2020 , Article)
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ...
An automated refactoring approach to improve IoT software quality
(
MDPI AG
, 2020 , Article)
Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ...