Search
Now showing items 141-150 of 174
The impact of inter-layer network coding on the relative performance of MRC/MDC WiFi media delivery
(
ACM
, 2011 , Conference Paper)
A primary challenge in multicasting video in a wireless LAN is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions from the AP. A ...
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core ...
Smart and Secure Blockchain-based Healthcare System Using Deep Q-Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Healthcare is one of the top priorities in modern society to provide better health facilities. Therefore, investments in health care systems increased rapidly, aligned with the population growth rate. Besides, the data ...
Dynamic Resource Allocation of eMBB-uRLLC Traffic in 5G New Radio
(
IEEE Computer Society
, 2020 , Conference Paper)
5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB) and massive Machine Type Communication ...
Active Learning with Noisy Labelers for Improving Classification Accuracy of Connected Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Machine learning has emerged as a promising paradigm for enabling connected, automated vehicles to autonomously cruise the streets and react to unexpected situations. Reacting to such situations requires accurate classification ...
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ...
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ...
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ...