Browsing Computer Science & Engineering by Title
Now showing items 1168-1187 of 2100
-
Interference-aware energy-efficient cross-layer design for healthcare monitoring applications
( Elsevier , 2014 , Article)Body Area Sensor Networks (BASNs) leverage wireless communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning; BASNs thus promotes new ... -
Interference-based optimal power-efficient access scheme for cognitive radio networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In this paper, we propose a new optimization-based access strategy of multi-packet reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum. We devise an analytical model that ... -
Internet of things mobility over information-centric/named-data networking
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Information-centric networking (ICN) is a content-oriented network that uses content instead of traditional IP addresses, it facilitates the content retrieval and calculates downstream paths without the need of an optimal ... -
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication ... -
Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: Application to children with asthma
( BioMed Central Ltd. , 2019 , Article)Background: Predictive modeling with longitudinal electronic health record (EHR) data offers great promise for accelerating personalized medicine and better informs clinical decision-making. Recently, deep learning models ... -
Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on designing an efficient routing strategy for vehicle-to-vehicle ... -
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
( IEEE Computer Society , 2021 , Other)5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ... -
Intrusion response systems for cyber-physical systems: A comprehensive survey
( Elsevier , 2023 , Article Review)Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS increased networked connectivity and may cause costly environmental hazards as well as human and financial loss. This necessitates designing and ... -
Investigating 3D holoscopic visual content upsampling using super-resolution for cultural heritage digitization
( Elsevier B.V. , 2019 , Article)Through this paper, we aim at investigating the impact of using deep learning-based technologies such as super-resolution on Holoscopic 3D (H3D) images. Holoscopic 3D imaging is a technology that aims at providing ... -
Investigating low-delay deep learning-based cultural image reconstruction
( Springer Science and Business Media Deutschland GmbH , 2020 , Conference Paper)Numerous cultural assets host a great historical and moral value, but due to their degradation, this value is heavily affected as their attractiveness is lost. One of the solutions that most heritage organizations and ... -
Investigating the Use of Autoencoders for Gait-based Person Recognition
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In recent years, gait has been growing as a biometric for person recognition at a distance. However, factors such as view angles and carrying conditions often make this task challenging. This paper proposes a solution to ... -
An IoT and Edge Computing Based Framework for Charge Scheduling and EV Selection in V2G Systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The daily fluctuations in the power requirements and the regulation of voltage and frequency cause substantial energy dissipation. These lead to a reduction in the operational efficiency of the power grid. V2G (Vehicle 2 ... -
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ... -
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ... -
IoT Based Compressive Sensing for ECG Monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The Internet of Things (IoT) has empowered several sets of applications related to remote monitoring for patients with chronic cardiovascular diseases, where, electrocardiogram (ECG) monitoring has been widely studied and ... -
IoT for smart city services: Lifecycle approach
( Association for Computing Machinery , 2016 , Conference Paper)"Internet of Things" (IoT) and "Smart City" are widely recognized to address the complexity of modern city operation. Concentration of population, scarcity of resources and environmental concerns are the main challenges ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ... -
IoT root union: A decentralized name resolving system for IoT based on blockchain
( Elsevier Ltd , 2021 , Article)A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ... -
IoT-based fire alarm system
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Fire alarm systems are essential in alerting people before tire engulfs their homes. However, tire alarm systems, today, require a lot of wiring and labor to be installed. This discourages users from installing them in ... -
IoT-based smart parking system for sporting event management
( Association for Computing Machinery , 2016 , Conference Paper)By connecting devices, people, vehicles and infrastructures everywhere in a city, governments and their partners can improve community wellbeing and other economic and financial aspects (e.g., cost and energy savings). ...