Search
Now showing items 141-150 of 165
Integrating Fog Computing with VANETs: A Consumer Perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Emerging vehicular ad hoc network (VANET) applications are requiring a lot more communication and computation capabilities. Today's cloud infrastructures are not specifically designed to cope with the requirements presented ...
Systematic identification of threats in the cloud: A Survey
(
Elsevier B.V.
, 2019 , Article)
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
Action recognition in poor-quality spectator crowd videos using head distribution-based person segmentation
(
Springer Verlag
, 2019 , Article)
Despite a big volume of research on action recognition, little attention has been given to individual action recognition in poor-quality spectator crowd scenes. It is an important scenario, because most of the surveillance ...
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
(
Springer Verlag
, 2019 , Article)
The Vehicular Ad hoc Networks (VANETs) are emerging networks that provide essential services to drivers on the road. To exchange data, vehicles as network nodes route information between source and destination using the ...
Secret Key Agreement for Data Dissemination in Vehicular Platoons
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. ...
Super-Resolution of Brain MRI Images Using Overcomplete Dictionaries and Nonlocal Similarity
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, the magnetic resonance imaging (MRI) images have limited and unsatisfactory resolutions due to various constraints such as physical, technological, and economic considerations. Super-resolution techniques can ...
Priority-based medium access control for wireless body area networks with high-performance design
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ...
Machine learning in the Internet of Things: Designed techniques for smart cities
(
Elsevier B.V.
, 2019 , Article)
Machine learning is one of the emerging technologies that has grabbed the attention of academicians and industrialists, and is expected to evolve in the near future. Machine learning techniques are anticipated to provide ...
A Multicharger Cooperative Energy Provision Algorithm Based on Density Clustering in the Industrial Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless sensor networks (WSNs) are an important core of the Industrial Internet of Things (IIoT). Wireless rechargeable sensor networks (WRSNs) are sensor networks that are charged by mobile chargers (MCs), and can achieve ...
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices
(
Elsevier B.V.
, 2019 , Article)
In a traditional attribute-based encryption (ABE) system, there is only one central authority who generates and hence knows the secret keys of all users, this problem is known as the key escrow problem. An ABE scheme which ...