Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 23, Issue 4April 2024Current Issue
Publisher:
  • IEEE Educational Activities Department
  • 445 Hoes Lane P.O. Box 1331 Piscataway, NJ
  • United States
ISSN:1536-1233
Bibliometrics
research-article
Methods to Assign UAVs for K-Coverage and Recharging in IoT Networks

This article studies a coverage problem in Internet of things (IoT) networks using unmanned aerial vehicles (UAVs) supported by solar-powered charging platforms. The problem at hand is to determine an assignment of UAVs to either a charging station or a ...

research-article
UAV-Assisted Task Offloading in Vehicular Edge Computing Networks

Vehicular edge computing (VEC) provides an effective task offloading paradigm by pushing cloud resources to the vehicular network edges, e.g., road side units (RSUs). However, overloaded RSUs are likely to occur especially in urban aggregation areas, ...

research-article
Multi-Channel Nonlinearity Mitigation Using Machine Learning Algorithms

This paper investigates multi-channel machine learning (ML) techniques in the presence of receiver nonlinearities and noise, and compares the results with the single-channel receiver architecture. It is known that the multi-channel architecture relaxes ...

research-article
ArguteDUB: Deep Learning Based Distributed Uplink Beamforming in 6G-Based IoV

In the last decade, MIMO spatial multiplexing and distributed beamforming play a significant role in improving data throughput through cooperative transmission. It has been widely used in wireless communication, especially in 6G. However, the distributed ...

research-article
Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage

Data deduplication is of vital importance for mobile cloud computing to cope with the explosive growth of outsourced mobile data. In order to ensure the privacy of sensitive mobile data against an untrusted cloud, Message-Locked Encryption (MLE) has been ...

research-article
Deep Meta Q-Learning Based Multi-Task Offloading in Edge-Cloud Systems

Resource-constrained edge devices can not efficiently handle the explosive growth of mobile data and the increasing computational demand of modern-day user applications. Task offloading allows the migration of complex tasks from user devices to the remote ...

research-article
B-Detection: Runtime Reliability Anomaly Detection for MEC Services With Boosting LSTM Autoencoder

By pushing computing resources from the cloud to the network edge close to mobile users, mobile edge computing (MEC) enables low latency for a wide variety of applications. Nevertheless, in dynamic MEC systems, MEC services are challenged by the risks of ...

research-article
Efficient Dynamic Distributed Resource Slicing in 6G Multi-Access Edge Computing Networks With Online ADMM and Message Passing Graph Neural Networks

We consider the problem of resource slicing in the 6<sup>th</sup> generation multi-access edge computing (6G-MEC) network. The network includes many non-stationary space-air-ground-sea nodes with dynamic, unstable connections and resources, where any node ...

research-article
Intelligent Routing in Directional Ad Hoc Networks Through Predictive Directional Heat Map From Spatio-Temporal Deep Learning

By applying a simple shortest/minimum-cost routing algorithm, the mobile ad-hoc network (MANET) with heavy data transmissions may be easily congested if multiple routes meet at the same relay node. Therefore, those busy nodes should be avoided when a new ...

research-article
Adaptive Video Streaming in Multi-Tier Computing Networks: Joint Edge Transcoding and Client Enhancement

With the advancement of multimedia technology and wireless networks, there is a growing demand for high-quality video streaming. Delivering stable video streaming in extremely dynamic wireless networks, nevertheless, is still an open problem. Recent ...

research-article
Open Access
Investigating the Applicability of Nested Secret Share for Drone Fleet Photo Storage

Military drones can be used for surveillance or spying on enemies. They, however, can be either destroyed or captured, therefore photos contained inside them can be lost or revealed to the attacker. A possible solution to solve such a problem is to adopt ...

research-article
Pa-Count: Passenger Counting in Vehicles Using Wi-Fi Signals

Passenger counting is crucial for many applications such as vehicle scheduling and traffic capacity assessment. However, most of the existing solutions are either high-cost, privacy invasive or not suitable for passengers the vehicle scenarios. In this ...

research-article
Energy Efficient and Differentially Private Federated Learning via a Piggyback Approach

This artilce aims to develop a differential private federated learning (FL) scheme with the least artificial noises added while minimizing the energy consumption of participating mobile devices. By observing that some communication efficient FL approaches ...

research-article
PICO: Pipeline Inference Framework for Versatile CNNs on Diverse Mobile Devices

Distributing the inference of convolutional neural network (CNN) to multiple mobile devices has been studied in recent years to achieve real-time inference without losing accuracy. However, how to map CNN to devices remains a challenge. On the one hand, ...

research-article
Efficient Resource Management and Expansion Scheme for Collaborative Edge-Cloud Computing

Integrating the advantages of both the edge and the cloud, the edge-cloud computing system emerges to provide high-quality computing services for mobile users. To improve system efficiency, we investigate a hybrid mode of resource collaboration and ...

research-article
<monospace>LDRP</monospace>: Device-Centric Latency Diagnostic and Reduction for Cellular Networks Without Root

We design and implement <monospace>LDRP</monospace>, a device-based, standard-compliant solution to latency diagnosis and reduction in mobile networks without root privilege. <monospace>LDRP</monospace> takes a data-driven approach and works with a ...

research-article
Decentralized Scheduling for Concurrent Tasks in Mobile Edge Computing via Deep Reinforcement Learning

Mobile Edge Computing (MEC) is a promising solution to enhance the computing capability of resource-limited networks. A fundamental problem in MEC is efficiently offloading tasks from user devices to edge servers. However, there still exists a gap to ...

research-article
On State Transition Probability and Performance of Direct Acyclic Graph Based Ledgers

Direct acyclic graph (DAG) based ledgers with multi-chain structures aim to solve the technical bottlenecks associated with classical blockchain technologies in the Internet of Things (IoT). The basic working principle of DAG-based ledgers is to validate ...

research-article
Leto: Crowdsourced Radio Map Construction With Learned Topology and a Few Landmarks

Existing crowdsourced indoor positioning systems (CIPSs) usually require prior knowledge about the site and a tedious calibration process. Moreover, they may require a large number of landmarks while ignoring the topology information that may be contained ...

research-article
Enhancing Federated Learning With Server-Side Unlabeled Data by Adaptive Client and Data Selection

Federated learning (FL) has been widely applied to collaboratively train deep learning (DL) models on massive end devices (i.e., clients). Due to the limited storage capacity and high labeling cost, the data on each client may be insufficient for model ...

research-article
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy

The authentication technology of mobile device users has been studied for decades. To balance security, privacy, and usability, motion sensors-based user authentication methods are widely investigated in recent years. However, existing studies meet the ...

research-article
Learning Audio and Video Bitrate Selection Strategies via Explicit Requirements

Mobile video streaming dominates today&#x0027;s network traffic, and adaptive bitrate (ABR) algorithms have been routinely adopted for transmitting media content across dynamic mobile networks. State-of-the-art ABR algorithms mainly alter video bitrate ...

research-article
Energy-Efficiency Optimization With Model Convexification for Wireless Ad Hoc Networks With Multi-Packet Reception Capability

Energy efficiency is a significant requirement of resource management and design optimization in information networks. In this article, we propose an iterative fractional programming framework embedded with a distributed primal-dual extra-gradient ...

research-article
Programmable and Customized Intelligence for Traffic Steering in 5G Networks Using Open RAN Architectures

5G and beyond mobile networks will support heterogeneous use cases at an unprecedented scale, thus demanding automated control and optimization of network functionalities customized to the needs of individual users. Such fine-grained control of the Radio ...

research-article
L-NORM: <underline>L</underline>earning and <underline>N</underline>etwork <underline>O</underline>rchestration at the Edge for <underline>R</underline>obot Connectivity and <underline>M</underline>obility in Factory Floor Environments

Robotic factory floors will revolutionize the future of manufacturing and the service industry by automating tasks. However, to fully supplement human effort, these robots will need low-latency, reliable connectivity throughout the work zone through links ...

research-article
CoTEV: Trustworthy and Cooperative Task Execution in Internet of Vehicles

Due to the increasing number of service requests from the vehicles, the load at the road side units (RSUs) increases, which affects the delay-sensitive vehicle services. In Internet of Vehicles (IoV), the vehicles can communicate directly with other ...

research-article
Integrated Host- and Content-Centric Routing for Efficient and Scalable Networking of UAV Swarm

Efficient and scalable networking is a key enabler of the Unmanned Aerial Vehicle (UAV) swarms, wherein multiple UAVs cooperatively execute complicated tasks. Despite the intermittent connections due to the UAV mobility, stable paths may exist temporally ...

research-article
WiRITE: General and Practical Wi-Fi Based Hand-Writing Recognition

Device-free hand-writing systems identify the content that a user writes by hand movement in the air, thus providing an intuitive human computer interface. In this paper, we propose WiRITE, a Wi-Fi hand-writing recognition system built with commodity Wi-...

research-article
Joint Service Caching, Resource Allocation and Task Offloading for MEC-Based Networks: A Multi-Layer Optimization Approach

To provide reliable and elastic Multi-access edge computing services, one feasible solution is to federate geographically proximate edge servers to form a logically centralized resource pool. Optimization of such systems, however, becomes challenging. In ...

research-article
Tradeoff Between Age of Information and Operation Time for UAV Sensing Over Multi-Cell Cellular Networks

Unmanned aerial vehicles (UAVs) have a significant potential for sensing applications in further cellular networks due to their extensive coverage and flexible deployment. In this paper, we consider a multi-cell cellular network with a cellular-connected ...

Comments