Search
Now showing items 1-10 of 12
Collaborative joint caching and transcoding in mobile edge networks
(
Academic Press
, 2019 , Article)
Video streaming has become a leading consumer of network resources in the last decade. Despite considerable developments, video content providers still face major challenges, which include minimizing data transfer from ...
Estimating the number of sources in white Gaussian noise: Simple eigenvalues based approaches
(
Institution of Engineering and Technology
, 2017 , Article)
Estimating the number of sources is a key task in many array signal processing applications. Conventional algorithms such as Akaike's information criterion (AIC) and minimum description length (MDL) suffer from underestimation ...
Access Control Schemes for Implantable Medical Devices: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely secured since the patient's ...
Relay selection schemes to minimise outage in wireless powered communication networks
(
Institution of Engineering and Technology
, 2016 , Article)
In this study, the authors discuss relay selection schemes with the objective to minimise outage probability for a network consisting of a single source, multiple relays and a single destination. The relays are powered by ...
3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day's life. The heterogeneous nature of IoT devices and the complex use scenarios make it hard to ...
QDRL: QoS-Aware Deep Reinforcement Learning Approach for Tor's Circuit Scheduling
(
IEEE Computer Society
, 2022 , Article)
Tor is a popular anonymity network adopted by more than two million users to preserve their privacy. Tor was mainly developed as a low-latency network to support interactive web browsing and messaging applications. However, ...
RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for Low Latency IoT Systems
(
IEEE Computer Society
, 2022 , Article)
Although Deep Neural Networks (DNN) have become the backbone technology of several ubiquitous applications, their deployment in resource-constrained machines, e.g., Internet of Things (IoT) devices, is still challenging. ...
On Designing Smart Agents for Service Provisioning in Blockchain-Powered Systems
(
IEEE Computer Society
, 2022 , Article)
Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users' Quality of Experience (QoE) and the operation cost endured by providers. These ...
Deep Reinforcement Learning for Network Selection over Heterogeneous Health Systems
(
IEEE Computer Society
, 2022 , Article)
Smart health systems improve our quality oflife by integrating diverse information and technologies into health and medical practices. Such technologies can significantly improve the existing health services. However, ...
AI-based UAV navigation framework with digital twin technology for mobile target visitation
(
Elsevier
, 2023 , Article)
Unmanned Air Vehicles (UAVs), i.e. drones, have become a key enabler technology of many reconnaissance applications in different fields, such as military, maritime, and transportation. UAVs offer several benefits, such as ...