Search
Now showing items 291-300 of 407
Power Allocation for D2D Communications with SWIPT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Power allocation plays a vital role in coordinating interference between Device-to-Device (D2D) and cellular communications, and when power allocation meets simultaneous wireless information and power transfer (SWIPT), the ...
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph
(
IEEE Computer Society
, 2022 , Article)
With the rapid development of programming platforms, how to utilize the tremendous amount of data produced by the platforms, such as Scatch, has been a big challenge to researchers. The growing data is not only huge, but ...
Product failure detection for production lines using a data-driven model
(
Elsevier
, 2022 , Article)
For a healthy production line, it is essential to ensure a low failure rate of products. Product quality in production lines can be inspected using several techniques at the end of a production process, including a manual ...
Accelerated IoT Anti-Jamming: A Game Theoretic Power Allocation Strategy
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
A jamming combating power allocation strategy is proposed to secure the data communication in IoT networks. The proposed strategy aims to minimize the worst case jamming effect on the intended transmission under multi ...
Intelligent and secure edge-enabled computing model for sustainable cities using green internet of things
(
Elsevier Ltd
, 2021 , Article)
Internet of Things (IoT) consists of a huge number of sensors along with physical things to gather and forward data intelligently. Green IoT applications based on Wireless Sensor Networks (WSNs) are developed in various ...
Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Currently, the highly dynamic fog computing resource requirements introduced by the diverse services of the Internet of Things (IoT) result in an imbalance between computing resource providers and consumers. However, current ...
TamForen: A tamper-proof cloud forensic framework
(
John Wiley and Sons Inc
, 2022 , Article)
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ...
Diminishing Returns and Deep Learning for Adaptive CPU Resource Allocation of Containers
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Containers provide a lightweight runtime environment for microservices applications while enabling better server utilization. Automatic optimal allocation of CPU pins to the containers serving specific workloads can help ...
An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile ...
Privacy-Aware Collaborative Task Offloading in Fog Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ...