A survey on privacy-preserving authentication protocols for secure vehicular communication
Secure vehicular communication is one of the challenges of vehicular technology. The main goal of vehicular ad hoc networks is to prevent road accidents and collisions by transferring traffic signals and essential information to vehicles ...
A survey on integrated computing, caching, and communication in the cloud-to-edge continuum
- Adyson Maia,
- Akram Boutouchent,
- Youcef Kardjadja,
- Manel Gherari,
- Ece Gelal Soyak,
- Muhammad Saqib,
- Kacem Boussekar,
- Idil Cilbir,
- Sama Habibi,
- Soukaina Ouledsidi Ali,
- Wessam Ajib,
- Halima Elbiaze,
- Ozgur Erçetin,
- Yacine Ghamri-Doudane,
- Roch Glitho
Cloud and edge computing have proposed different functionalities to enable multiple applications requiring different communication, computing, and caching (3C) resources. The upcoming futuristic applications (e.g., metaverse, holographic, and ...
An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare
Smart healthcare overcomes the limitations of time and space, allowing users to access medical and health services anywhere and anytime, thus improving the quality and efficiency of these services. However, due to its excessive reliance on ...
Optimization and analysis of air-to-ground wireless link parameters for UAV mounted adaptable Radar Antenna Array
Unmanned Aerial Vehicles (UAVs) are rapidly used in a variety of applications such as surveillance, search and rescue operation, delivery, etc. These operations strongly depend on the performance of the air-to-ground (A2G) communication link. ...
AP-assisted adaptive video streaming in wireless networks with high-density clients
Adaptive video streaming over wireless networks has experienced tremendous growth in past few years. In order to guarantee users’ quality of experience (QoE), adaptive bitrate (ABR) algorithms have been extensively studied. With the recent ...
STI: A self-evolutive traffic identification system for unknown applications based on improved random forest
Artificial intelligence technology has proven potential and effective in traffic identification for network management and security. However, the accuracy of its identification is easily influenced by the massive unknown traffic. Given the fact ...
Comprehensive fault diagnosis in UAV-assisted sensor networks: A three-phase automated approach
Ensuring operational safety in an automated working environment is a crucial requirement. In this article, we propose a technique for automated fault diagnosis in unmanned aerial vehicle-based sensor networks (UAV-sensor networks) aimed ...
Interaction behavior enhanced community detection in online social networks
Community detection in online social networks (OSNs) has attracted a great deal of attention in recent years due to its potential prospects in applications such as recommendation systems, spam detection, targeted advertising, etc. However, ...
Relay selection in Underwater Acoustic Sensor Networks for QoS-based cooperative communication using game theory
Underwater Acoustic Sensor Networks (UASN) plays a crucial role in monitoring and transmitting environmental information for marine resource exploration. However, underwater communication faces significant challenges such as signal attenuation, ...
Highlights
- A novel relay selection strategy for UASN was devised using potential game theory.
- The feasibility and existence of pure strategy NE in the proposed game were verified.
- A low-complexity algorithm, QoS-RSIA was proposed to gain ...
Secrecy outage performance of MIMO-NOMA relay systems with MRT/MRC schemes
Non-orthogonal multiple access (NOMA) systems have indicated that they can provide higher spectral efficiency and secrecy capability compared with orthogonal multiple access (OMA) conventional systems. Therefore, the NOMA technique is expected to ...
Automated aerial assessment for seamless adaptive adhoc restoration in partially collapsed network
Disasters often result in widespread infrastructure failures, leading to network blackouts that impede critical information dissemination and hamper search-and-rescue operations. This paper presents a novel methodology for expedited assessment ...
A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver
The introduction of Multi User (MU) communication in IEEE 802.11ax in the frequency domain via MU Orthogonal Frequency Division Multiple Access (MU-OFDMA) and in the spatial domain via MU Multiple Input Multiple Output (MU-MIMO) enables the ...
LoRa localisation using single mobile gateway
Effective use of GPS and mobile networks for localisation in rangeland areas is constrained by their high power consumption and high deployment costs. Long-range (LoRa), a low-power wide area network (LPWAN) technology, can be employed to ...
Highlights
- It proposes a novel methodology for localisation using a single mobile LoRa gateway.
- Machine learning is used to map the distance between targets and gateway from RSSI.
- Three LoRa datasets were collected in semi-line-of-sight ...
Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers
Within the realm of sixth-generation (6G) wireless systems, there exist two primary imperatives: establishing massive connections and ensuring robust data transmission security. Therefore, this paper delves into the realm of physical layer ...
COCKTAIL: Video streaming QoE optimization with chunk replacement and guided learning
Adaptive bitrate (ABR) algorithms aim to provide the best user quality of experience (QoE) under fluctuating operating environments. Prior ABR protocols address the QoE maximization problem with a plethora of approximate optimization techniques ...
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection
This paper investigates the covert communication in an air-to-ground (A2G) system, where a UAV (Alice) can adopt the omnidirectional microwave (OM) or directional mmWave (DM) transmission mode to transmit covert data to a ground user (Bob) while ...
Fairness-oriented multicast routing for distributed interactive applications
Facing the challenges of network services on the edge, such as routing considering Quality of Service, is a crucial issue for current networking research efforts. Multicast routing is an essential technique for delivering routing services at a ...
Benchmarking methodology for IPv4aaS technologies: Comparison of the scalability of the Jool implementation of 464XLAT and MAP-T
A novel method is proposed for the performance and scalability measurements of the IPv4-as-a-Service (IPv4aaS) technologies. It works according to the dual Device Under Test (DUT) setup of RFC 8219 and is suitable for benchmarking any of the five ...
Multi-round transmission and contention protocol in WLANs with multi-packet reception
Nowadays, there are many scenarios in Wi-Fi networks where many devices compete for network access via an Access Point to transmit their information. Thus, the ability to separate multiple packets sent simultaneously using advanced digital ...
Enhancement of edge-based surveillance videos based on bilateral filtering
Digital pictures are modified during the process of image enhancement to provide outcomes that are more suited for display or additional image analysis. Up to now, many achievements have been made in the field of image enhancement processing. ...
KDSMALL: A lightweight small object detection algorithm based on knowledge distillation
- Wen Zhou,
- Xiaodon Wang,
- Yusheng Fan,
- Yishuai Yang,
- Yihan Wen,
- Yixuan Li,
- Yicheng Xu,
- Zhengyuan Lin,
- Langlang Chen,
- Shizhou Yao,
- Liu Zequn,
- Jianqing Wang
With the development of computer vision, small object detection has become a research pain point and difficulty in computer vision. Feature acquisition and accurate localization of small objects are two serious challenges that exist for small ...
Highlights
- The KDSAMLL algorithm, a lightweight small target detection algorithm, was fused into the YOLOV5s benchmark network test and its mAP metrics improved by 24.5% on the VOC2007+2012 dataset.
- Knowledge distillation of the teacher–student ...