Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 203, Issue CApr 2023
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
editorial
Review Articles
review-article
An overview of MAC energy-saving mechanisms in Wi-Fi
Abstract

The IEEE 802.11 standard has rapidly become the de facto standard for Wireless Local Area Networks (WLANs) under the commercial name Wi-Fi. Despite IEEE’s regular efforts to improve the energy efficiency of Wi-Fi, many energy-saving mechanisms ...

review-article
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions
Abstract

In recent years, Decentralized Online Social Networks (DOSNs) have been attracting the attention of many users because they reduce the risk of censorship, surveillance, and information leakage from the service provider. In contrast to the most ...

Regular Articles
research-article
Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
Abstract

The remarkable advance of the Internet of Things (IoT) has smoothed the way to the interconnection of various mobile devices in secure access and communication. In order to guarantee user privacy and anonymity in public networks, a large number ...

research-article
Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs
Abstract

Reliable connectivity restoration mechanism is essential for retaining the prolonged network functioning of Wireless Sensor and Actor Networks (WSANs). WSANs operate in harsh or inhospitable environments and are susceptible to multiple node ...

research-article
Multi-user edge service orchestration based on Deep Reinforcement Learning
Abstract

The fifth generation (5G) of mobile network offers a remarkable degree of flexibility to mobile operators, enabling them to provide users with effective and tailored network services. Software Defined Networking (SDN), Network Function ...

research-article
Enabling privacy by anonymization in the collection of similar data in multi-domain IoT
Abstract

The efficiency of Internet of Things (IoT) systems heavily relies on possessing trustworthy and up-to-date data. Thus, data collection represents a key feature in IoT applications and services that rely on data-streams. Reusing the same data-...

research-article
Multi-UAV WRSN charging path planning based on improved heed and IA-DRL
Abstract

Aiming at the problem of how to improve the energy utilization rate of UAV (Unmanned Aerial Vehicle) in the charging process of wireless rechargeable sensor network, a charging path planning scheme for multi-UAV wireless rechargeable sensor ...

research-article
TCAM-based packet classification for many-field rules of SDNs
Abstract

Software-defined networking (SDN) provides an emerging paradigm for future network architectures. OpenFlow is a widely deployed south-bound protocol for SDN. It uses rule-based packet forwarding and each rule may support many header fields for ...

research-article
Fine-grained frequencies meet synchronous transmission
Abstract

Fine-grained frequencies have been used for IEEE 802.15.4 based communication in several recent works to enhance network throughput as well as combat Cross Technology Interference (CTI) in licence free ISM bands. However, the works demonstrate ...

research-article
Joint think locally and globally: Communication-efficient federated learning with feature-aligned filter selection
Abstract

Federated learning, as a distributed machine learning framework that can protect data privacy, has recently received increasing attention. In federated learning, a shared global model is obtained through parameter interaction, which leads to ...

research-article
Locality-aware deployment of application microservices for multi-domain fog computing
Abstract

In fog computing customers’ microservices may demand access to connected objects, data sources and computing resources outside the domain of their fog provider In practice, the locality of connected objects renders mandatory a multi-domain ...

research-article
A cost-efficient hybrid redundancy coding scheme for wireless storage systems
Abstract

With distributed storage technique becoming a promising technology for storing massive data in wireless environment, how to improve the reliability of the storage systems has become the focus of researchers. As a redundancy scheme, the erasure ...

research-article
A parallel computing based model for online binary computation offloading in mobile edge computing
Abstract

Mobile-edge computing (MEC) with wireless power transfer has recently emerged as a viable concept for improving the data processing capacity of limited powered networks like wireless sensor networks (WSN) and the internet of things (IoT). In this ...

research-article
AI-assisted traffic matrix prediction using GA-enabled deep ensemble learning for hybrid SDN
Abstract

A hybrid software-defined network (SDN), which is a network where traditional routers and SDN protocols coexist during the incremental deployment of SDNs, requires real-time link traffic information for effective deployment. This has called for ...

research-article
Joint resource optimization and trajectory design for energy minimization in UAV-assisted mobile-edge computing systems
Abstract

This paper studies an unmanned aerial vehicle (UAV)-assisted mobile-edge computing (MEC) system, where a rotary-wing UAV equipped with computing platforms is used to assist ground users (GUs) with insufficient computing resource. Each GU offloads ...

VSI:XAI4NG-IoT
research-article
Complex parts machining path planning through cross-source point cloud processing
Abstract

When cleaning cast parts, production machinery such as robots and smart machines must be able to operate tools along appropriate machining paths. Planning the machining path using 3D point cloud processing techniques is a suitable approach. The ...

Highlights

  • To plan the robotic machining path of complex parts, a novel cross-source point cloud processing based method is proposed. The core of this method is the accurate registration of cross-source point clouds with relatively large scale ...

research-article
Robust decentralized stochastic gradient descent over unstable networks
Abstract

Decentralized learning is essential for large-scale deep learning due to its great advantage in breaking the communication bottleneck. Most decentralized learning algorithms focus on reducing the communication overhead without taking into account ...

research-article
Interpretable intrusion detection for next generation of Internet of Things
Abstract

This paper presents a new framework for intrusion detection in the next-generation Internet of Things. MinMax normalization strategy is used to collect and preprocess data. The Marine Predator algorithm is then used to select relevant features to ...

research-article
IoT-assisted feature learning for surface settlement prediction caused by shield tunnelling
Abstract

The surface settlement caused by shield tunnelling may lead to collapse disaster, threatening the safety of ground and underground structures. Therefore, the prediction of surface settlement has attracted much attention, but the problem has not ...

Highlights

  • The time–space relationship of surface settlement caused by shield tunnelling cannot be ignored.
  • A IoT-assisted feature learning algorithm for predicting surface settlement is proposed.
  • The prediction effect of the proposed ...

VSI: IWNSC
research-article
A temporal–spatial analysis on the socioeconomic development of rural villages in Thailand and Vietnam based on satellite image data
Abstract

Obtaining accurate and timely estimates of socio-economic status at fine geographical resolutions is essential for global sustainable development and the fight against poverty. However, data related to local socio-economic dynamics in rural ...

VSI: MedComNet 2022
research-article
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing
Abstract

Attribute-based Searchable Encryption is emerging as a promising cryptographic technique supporting data protection, flexible access control, and keyword search over encrypted data. The current scientific literature already investigated its ...

research-article
Modeling Value of Information in remote sensing from correlated sources
Abstract

This paper investigates data correlation in remote sensing networks and how it can be characterized through diverse models quantifying the Value of Information (VoI), a metric that describes how informative the data transmitted by the sensors ...

Highlights

  • In scenarios with multiple sources, their correlation benefits the Age of Information.
  • When correlation is considered, we better speak of Value of Information (VoI).
  • To track it, we exploit the Markov property of the resulting ...

VSI: WC-COVID-19-GT
research-article
Reinforced practical Byzantine fault tolerance consensus protocol for cyber physical systems
Abstract

Cyber–physical systems (CPS) are becoming an essential component of modern life. CPS services enable information to be exchanged between physical devices and virtual systems. The increasing malicious activities causing confidential data leakage ...

Graphical abstract

Display Omitted

Comments