Browsing Computer Science & Engineering by Title
Now showing items 1296-1315 of 2280
-
Joint Demand-Side Management in Smart Grid for Green Collaborative Mobile Operators under Dynamic Pricing and Fairness Setup
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)In this paper, the interactions between multiple mobile operators, owning heterogeneous cellular networks, and energy retailers existing in the smart grid are investigated. Energy procurement decisions of the cellular ... -
Joint Flight Cruise Control and Data Collection in UAV-Aided Internet of Things: An Onboard Deep Reinforcement Learning Approach
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Employing unmanned aerial vehicles (UAVs) as aerial data collectors in Internet-of-Things (IoT) networks is a promising technology for large-scale environment sensing. A key challenge in UAV-aided data collection is that ... -
Joint mode selection, channel allocation and power assignment for green device-to-device communications
( IEEE Computer Society , 2014 , Conference Paper)Device-to-Device (D2D) communication has emerged as a promising technique for improving capacity and reducing power consumption in wireless networks. Most existing works on D2D communications either targeted CDMA-based ... -
Joint Optimal Placement, Routing, and Flow Assignment in Wireless Sensor Networks for Structural Health Monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Sensor node placement optimization has a significant role in wireless sensor networks, especially in structural health monitoring. Since sensor node placement affects the routing, optimization should be Jointly done for ... -
Joint physical-application layer security for wireless multimedia delivery
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ... -
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
( Elsevier B.V. , 2021 , Article)Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ... -
Joint Resource Allocation and Trajectory Optimization with QoS in NOMA UAV Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this paper, we mainly studied the joint resource allocation and UAV trajectory optimization for maximizing the total energy efficiency in UAV-based non-orthogonal multiple access (NOMA) downlink wireless networks with ... -
Joint Resource Allocation and Trajectory Optimization with QoS in UAV-Based NOMA Wireless Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Replacing base stations with unmanned aerial vehicles (UAVs) to serve the communication of ground users has attracted a lot of attention recently. In this paper, we study the joint resource allocation and UAV trajectory ... -
Joint routing and resource allocation for delay minimization in cognitive radio based mesh networks
( IEEE , 2014 , Article)This paper studies the joint design of routing and resource allocation algorithms in cognitive radio based wireless mesh networks. The mesh nodes utilize cognitive overlay mode to share the spectrum with primary users. ... -
Joint routing and resource allocation for delay sensitive traffic in cognitive mesh networks
( IEEE , 2011 , Conference Paper)In this paper we study the problem of joint design of routing and resource allocation in cognitive radio based wireless mesh networks. Our study focuses on a cognitive system model in which secondary nodes have delay ... -
Joint security and energy efficiency in iot networks through clustering and bit flipping
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Channel-aware encryption is investigated as a physical layer security technique in internet of things (IoT) scenarios. Clustering algorithms for grouping sensor nodes into cooperative clusters are proposed, with the purpose ... -
Joint sparsity recovery for compressive sensing based EEG system
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The last decade has witnessed tremendous efforts to shape the internet of thing (IoT) platforms to be well suited for healthcare applications. These applications involve the deployment of remote monitoring platforms to ... -
Joint user association and resource allocation in HetNets based on user mobility prediction
( Elsevier B.V. , 2020 , Article)Virtual small cell (VSC) formed by directional beams is seen as an alternative for the small base station (SBS) within the coverage of macro base station (MBS), to increase system capacity and reduce site cost. However, ... -
Joint user-channel assignment for efficient use of renewable energy in hybrid powered communication systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In this paper, we introduce a new green resource allocation problem using hybrid powering of the communication system from renewable and non-renewable sources. The objective is to efficiently allocate the power delivered ... -
Jointly identifying opinion mining elements and fuzzy measurement of opinion intensity to analyze product features
( Elsevier Ltd , 2016 , Article)Opinion mining mainly involves three elements: feature and feature-of relations, opinion expressions and the related opinion attributes (e.g. Polarity), and feature-opinion relations. Although many works have emerged to ... -
KCLP: A k-Means Cluster-Based Location Privacy Protection Scheme in WSNs for IoT
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)While enjoying the convenience brought by the Internet of Things (IoT), people also encounter many problems with wireless sensor networks (WSNs), the foundation of IoT. Security problems are especially of concern. In this ... -
KERTAS: dataset for automatic dating of ancient Arabic manuscripts
( Springer Verlag , 2018 , Article)The age of a historical manuscript can be an invaluable source of information for paleographers and historians. The process of automatic manuscript age detection has inherent complexities, which are compounded by the lack ... -
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ... -
Key-policy attribute-based encryption with keyword search in virtualized environments
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ... -
KinFit: A factual aerobic sport game with stimulation support
( Kassel University Press GmbH , 2018 , Article)Overweight and obesity is a situation where a person has stacked too much fat that might affect negatively his/her health. Many people skip doing exercises due to several facts related to the encouragement, health-awareness, ...