Search
Now showing items 1-10 of 162
G-RAT | A novel graphical randomized authentication technique for consumer smart devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
Understanding probabilistic cognitive relaying communication with experimental implementation and performance analysis
(
MDPI AG
, 2019 , Article)
Efficiently use of the limited wireless spectrum can be achieved by cooperative cognitive relaying, where secondary users (SUs), who do not pay for the licensed spectrum and have better channel condition to the primary ...
The limit of blockchains: Infeasibility of a smart obama-trump contract
(
Association for Computing Machinery
, 2019 , Article)
Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.
How to govern the non-cooperative amateur drones?
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, amateur UAVs have become more and more popular. This is due to the decreasing cost and growing range of applications such as weather monitoring, cargo transport and recreational purposes. However, ...
Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this paper, we propose a joint channel allocation and power control algorithm by using cognitive radio non-orthogonal multiple access (CR-NOMA) for femtocell users (FUs). The aim is to maximize the sum rate of the FUs ...
Edge computing for smart health: Context-aware approaches, opportunities, and challenges
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Improving the efficiency of healthcare systems is a top national interest worldwide. However, the need to deliver scalable healthcare services to patients while reducing costs is a challenging issue. Among the most promising ...
A Bi-layered parallel training architecture for large-scale convolutional neural networks
(
IEEE Computer Society
, 2019 , Article)
Benefitting from large-scale training datasets and the complex training network, Convolutional Neural Networks (CNNs) are widely applied in various fields with high accuracy. However, the training process of CNNs is very ...
Prediction-based delay optimization data collection algorithm for underwater acoustic sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The past years have seen a rapid development of autonomous underwater vehicle-aided (AUV-aided) data-gathering schemes in underwater acoustic sensor networks (UASNs). The use of AUVs efficiently reduces energy consumption ...
Design of Protograph-LDPC-Based BICM-ID for Multi-Level-Cell (MLC) NAND Flash Memory
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this letter, the optimization of protograph-low-density parity-check (LDPC)-based bit-interleaved coded modulation with iterative detection and decoding (BICM-ID) with anti-Gray mapping is investigated over multi-level-cell ...
A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Underwater acoustic sensor networks (UASNs) have been widely applied in underwater scenarios where numerous anchoring or floating sensor nodes collaborate in performing some specific assignments, such as information ...