بحث بسيط
السجلات المعروضة 1 -- 10 من 31
A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network
(
MDPI
, 2020 , Article)
Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ...
An incentive mechanism for data sharing based on blockchain with smart contracts
(
Elsevier
, 2020 , Article)
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ...
Blockchain-Based Distributed Energy Trading in Energy Internet: An SDN Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The new network paradigm of Software Defined Networking (SDN) has been widely adopted. Due to its inherent advantages, SDN has been widely used in various network fields such as data centers, WAN, enterprise, Optical ...
Dual-polarized spatial-temporal propagation measurement and modeling in uma o2i scenario at 3.5 GHz
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Outdoor-to-indoor (O2I) coverage in urban areas by using the sub-6 GHz (sub-6G) band is important in the fifth generation (5G) mobile communication system. The spatial-temporal propagation characteristics in different ...
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ...
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
(
Association for Computing Machinery
, 2022 , Article)
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
A Practical Cross Device Federated Learning Frame-work over 5G N etworks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The concept of federated learning (FL) was first proposed by Google in 2016. Thereafter, FL has been widely studied for the feasibility of application in various fields due to its potential to make full use of data without ...
Epidemic Risk Assessment by a Novel Communication Station Based Method
(
IEEE Computer Society
, 2022 , Article)
The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ...
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ...
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
(
Academic Press Inc.
, 2021 , Article)
HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ...