Search
Now showing items 1-10 of 34
A fog computing solution for context-based privacy leakage detection for android healthcare devices
(
MDPI AG
, 2019 , Article)
Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their ...
Symmetric encryption relying on chaotic henon system for secure hardware-friendly wireless communication of implantable medical systems
(
MDPI AG
, 2018 , Article)
Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, ...
Multi-layer perceptron model on chip for secure diabetic treatment
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
Diabetic patients use therapy from the insulin pump, a type of implantable medical device, for the infusion of insulin to control blood glucose level. While these devices offer many clinical benefits, there has been a ...
A Novel DCT-Based Compression Scheme for 5G Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Next-generation (5G) vehicular networks will support various network applications, leading to specific requirements and challenges for wireless access technologies. This trend has motivated the development of the long-term ...
Optimal energy trading for plug-in hybrid electric vehicles based on fog computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A large number of plug-in hybrid electric vehicles (PHEVs) have high mobility but a small battery capacity; thus, these vehicles urgently need to make charging and discharging decisions in real time. This paper proposes a ...
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ...
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot ...
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ...
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the vast increase in data transmission due to a large number of information collected by devices, data management, and security has been a challenge for organizations. Many data owners (DOs) outsource their data to ...
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
(
Elsevier Ltd
, 2019 , Article)
With the wide application of Unmanned Aerial Vehicles (UAVs) in production and life, more and more attention has been paid to the autonomous track planning of UAVs. When UAV path planning algorithm is dealing with flying ...