College of Engineering: Recent submissions
Now showing items 3001-3020 of 8739
-
A design of firewall based on feedback of intrusion detection system in cloud environment
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ... -
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ... -
5G vehicular network resource management for improving radio access through machine learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The current cellular technology and vehicular networks cannot satisfy the mighty strides of vehicular network demands. Resource management has become a complex and challenging objective to gain expected outcomes in a ... -
A novel chaos-based physical layer security transmission scheme for internet of things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ... -
An efficient and privacy-preserving energy trading scheme based on blockchain
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ... -
Cloud database encryption technology based on combinatorial encryption
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ... -
An automated refactoring approach to improve IoT software quality
( MDPI AG , 2020 , Article)Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ... -
StabTrust-A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Vehicular Ad-hoc Network (VANET) is a modern era of dynamic information distribution among societies. VANET provides an extensive diversity of applications in various domains, such as Intelligent Transport System (ITS) and ... -
Machine learning and discriminant function analysis in the formulation of generic models for sex prediction using patella measurements
( Springer Nature , 2022 , Article)Sex prediction from bone measurements that display sexual dimorphism is one of the most important aspects of forensic anthropology. Some bones like the skull and pelvis display distinct morphological traits that are based ... -
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ... -
Guest Editorial Special Section on AI-Driven Developments in 5G-Envisioned Industrial Automation: Big Data Perspective
( IEEE Computer Society , 2020 , Article)The papers in this special section examine artificial intelligence (AI)-driven developments in 5G mobile communications for industrial automation applications from a Big Data perspective. With the recent advances in ... -
Internet of things mobility over information-centric/named-data networking
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Information-centric networking (ICN) is a content-oriented network that uses content instead of traditional IP addresses, it facilitates the content retrieval and calculates downstream paths without the need of an optimal ... -
A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The unprecedented outbreak of the 2019 novel coronavirus, termed as COVID-19 by the World Health Organization (WHO), has placed numerous governments around the world in a precarious position. The impact of the COVID-19 ... -
Multi-access edge computing: A survey
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article Review)Multi-access Edge Computing (MEC) is a key solution that enables operators to open their networks to new services and IT ecosystems to leverage edge-cloud benefits in their networks and systems. Located in close proximity ... -
DL-CRC: Deep learning-based chest radiograph classification for covid-19 detection: A novel approach
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With the exponentially growing COVID-19 (coronavirus disease 2019) pandemic, clinicians continue to seek accurate and rapid diagnosis methods in addition to virus and antibody testing modalities. Because radiographs such ... -
IEEE Access Special section Editorial: Mobile edge computing and mobile cloud computing: Addressing heterogeneity and energy issues of compute and network resources
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Mobile applications are advancing toward higher network and compute requirements, which are similar to the requirements of server applications. Users prefer to perform their tasks on the go from mobile devices instead of ... -
A deep learning based static taint analysis approach for IoT software vulnerability location
( Elsevier B.V. , 2020 , Article)Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ... -
Deep CNN-Based real-time traffic light detector for self-driving vehicles
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the unavailability of Vehicle-to-Infrastructure (V2I) communication in current transportation systems, Traffic Light Detection (TLD) is still considered an important module in autonomous vehicles and Driver Assistance ... -
Notice of Retraction: Electromagnetic Radiation Due to Cellular, Wi-Fi and Bluetooth Technologies: How Safe Are We?
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Other)The electromagnetic radiation (EMR) emitted out of wireless communication modules in various IoT devices (especially used for healthcare applications due to their close proximity to the body) have been identified by ... -
System log detection model based on conformal prediction
( MDPI AG , 2020 , Article)With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...