College of Engineering: المرسلات الحديثة
السجلات المعروضة 2721 -- 2740 من 8384
-
Air quality monitoring and prediction system using machine-to-machine platform
(2012 , Conference Paper)This paper presents an ambient air quality monitoring and prediction system. The system consists of several distributed monitoring stations that communicate wirelessly to a backend server using machine-to-machine communication ... -
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ... -
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ... -
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
( IEEE Computer Society , 2020 , Article)With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ... -
An adaptive cache management approach in ICN with pre-filter queues
( Elsevier B.V. , 2020 , Article)In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ... -
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
( Science in China Press , 2020 , Article)The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ... -
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
( Science in China Press , 2020 , Article)The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social networks as its main design element. As one of the most critical components ... -
An energy-balanced trust cloud migration scheme for underwater acoustic sensor networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)As a candidate trust management scheme, trust models based on the cloud theory are always taken into account when detecting malicious attacks in Underwater Acoustic Sensor Networks (UASNs). To evaluate the trust values of ... -
A Node Location Algorithm Based on Node Movement Prediction in Underwater Acoustic Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Aiming at the problems of the low mobility, low location accuracy, high communication overhead, and high energy consumption of sensor nodes in underwater acoustic sensor networks, the MPL (movement prediction location) ... -
Peak Extraction Passive Source Localization Using a Single Hydrophone in Shallow Water
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this work, we use the acoustic ray model to study passive source localization problems using a single hydrophone for shallow water waveguides. It has been found that conventional matched field processing, which requires ... -
Enabling Efficient Coexistence of DSRC and C-V2X in Vehicular Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Radio access technologies, such as C-V2X and DSRC, have been used to support robust communication in connected vehicles scenarios. However, existing studies mostly dealt with homogenous vehicular networks, where coexistence ... -
Guest Editorial: Special Section on Integration of Big Data and Artificial Intelligence for Internet of Things
( IEEE Computer Society , 2020 , Other)These redundant data in IoT should be compressed or removed. Furthermore, the unstructured data in IoT plays an important role for analyzing the user behaviors, while transmitting and processing these unstructured data ... -
Reliable Federated Learning for Mobile Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Federated learning, as a promising machine learning approach, has emerged to leverage a distributed personalized dataset from a number of nodes, for example, mobile devices, to improve performance while simultaneously ... -
DAGIoV: A Framework for Vehicle to Vehicle Communication Using Directed Acyclic Graph and Game Theory
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication ... -
Power Allocation for D2D Communications with SWIPT
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Power allocation plays a vital role in coordinating interference between Device-to-Device (D2D) and cellular communications, and when power allocation meets simultaneous wireless information and power transfer (SWIPT), the ... -
AI-Enabled Reliable Channel Modeling Architecture for Fog Computing Vehicular Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Artificial intelligence (AI)-driven fog computing (FC) and its emerging role in vehicular networks is playing a remarkable role in revolutionizing daily human lives. Fog radio access networks are accommodating billions of ... -
ELC: Edge Linked Caching for content updating in information-centric Internet of Things
( Elsevier B.V. , 2020 , Article)Internet of things (IoT) has enabled every thing around us to have an Internet connection. In the future, IoT will generate more content than any other network. It is estimated that about 27 billion Internet enabled devices ... -
Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid
( IEEE Computer Society , 2020 , Article)In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, and mutual authentication, with reduced energy, communicational, and computational overheads, is proposed for resource-constrained ... -
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
( IEEE Computer Society , 2020 , Article)Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ... -
A High-Availability Data Collection Scheme based on Multi-AUVs for Underwater Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this paper, a high-availability data collection scheme based on multiple autonomous underwater vehicles (AUVs) (HAMA) is proposed to improve the performance of the sensor network and guarantee the high availability of ...