Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 161, Issue CAug 2024Current Issue
Bibliometrics
Skip Table Of Content Section
research-article
HPS: A Hybrid Proactive Scheduler with adaptive channel selection for industrial 6TiSCH networks
Abstract

The Industrial Internet of Things (IIoT) plays a vital role in Industry 4.0, thanks to advanced wireless protocols like IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) and their incorporation in the IPv6 stack via 6TiSCH. These protocols rely ...

article
Towards optimal tuned machine learning techniques based vehicular traffic prediction for real roads scenarios
Abstract

Smart cities have been widely investigated, and several algorithms, techniques, and protocols have recently been developed to serve smart city environments. Intelligent traffic management is one of the main research fields in this area. It aims ...

research-article
Fuzzy-AHP based optimal RSU deployment (Fuzzy-AHP-ORD) approach using road and traffic analysis in VANET
Abstract

Vehicular Ad Hoc Network (VANET) is a proven technology in Intelligent Transportation Systems (ITS) that provides various safety and non-safety applications. The Roadside Unit (RSU) is one of the essential components of the VANET, which allows ...

research-article
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
Abstract

The widespread usage of Android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermometers, biosensors, and more, ...

research-article
Voronoi diagrams and tree structures in HRP-EE: Enhancing IoT network lifespan with WSNs
Abstract

Within the domain of the Internet of Things (IoT), wireless sensor networks (WSNs) play a pivotal role, facilitating advancements in sectors such as smart urban infrastructures, intelligent healthcare systems, and residential automation. Despite ...

research-article
Cellular traffic forecasting based on inverted transformer for mobile perception dual-level base station sleep control
Abstract

Due to the extensive implementation of the fifth generation wireless communication networks (5 G), numerous base stations are being strategically deployed in densely inhabited areas to address the escalating need for network traffic. Within ...

research-article
Delay-guaranteed Mobile Augmented Reality Task Offloading in Edge-assisted Environment
Abstract

With the introduction of Augmented Reality (AR) into mobile devices, it becomes a trend to develop mobile AR applications in various fields. However, the execution of AR task demands the extensive resources of computation, memory and storage, ...

article
Context-aware multi-modal route selection service for urban computing scenarios
Abstract

The rapid urban population growth introduces novel challenges to urban mobility scenarios, requiring innovative and connected solutions to relieve traffic congestion and enhance transportation efficiency, using unusual roads and public ...

research-article
A dynamic pricing scheme for secure offloading and resource allocation based on the internet of vehicles
Abstract

With the development of sixth-generation (6G) wireless communication technology, billions of vehicles will access the network in the future, and the number of vehicle applications and user data will also increase dramatically. Traditional cloud ...

article
Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
Abstract

Special security techniques, such as intrusion detection mechanisms, are indispensable in modern computer systems. With the emergence of the Internet of Things they have become even more important. It is important to detect and identify the ...

research-article
A privacy-preserving location data collection framework for intelligent systems in edge computing
Abstract

With the rise of smart city applications, the accessibility of users’ location data by smart devices has increased significantly. However, this poses a privacy concern as attackers can deduce personal information from the raw location data. In ...

research-article
Factor graph-based deep reinforcement learning for path selection scheme in full-duplex wireless multihop networks
Abstract

A wireless multihop network (WMN) is set of wirelessly connected nodes without an aid of centralized infrastructure that can forward any packets via intermediate nodes by a multihop fashion. In the WMN, there are still some issues that need to be ...

Highlights

  • Proposing a novel fDRL scheme to optimize network capacity and reduce computation time in WMNs;
  • Using the FG approach, the fDRL scheme selects the best root node and reduces DRL computation time; and
  • Applying NLC to data ...

Comments