Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 35, Issue 2February 2024
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
EISSN:2161-3915
Reflects downloads up to 28 Jan 2025Bibliometrics
Skip Table Of Content Section
front-matter
research-article
Air quality forecasting‐driven cloud resource allocation for sustainable energy consumption: An ensemble classifier approach
Abstract

In recent times, air quality prediction is turned out to be one of the important research topics among research communities to prevent lives from negative health impacts. Random fluctuations of PM2.5 level brought about by frequent variations in ...

  • Air quality prediction‐enabled resource allocation system is proposed for cloud‐based software services that offers dynamic adjustment of resources based on workload demands with high energy efficiency.

  • A new weighted average ensemble classifier is ...

research-article
AFHO‐based link reliable routing and power‐assisted channel allocation protocol in cognitive radio networks for healthcare applications
Abstract

In the realm of cognitive networks, accommodating the increasing need for radio spectrum to facilitate both secondary and primary users stands as an intricate and demanding task. This study introduces a tailored framework for healthcare ...

AFHO based Channel allocation in cognitive radio networks image image

research-article
An efficient and secure wearable sensor based remote healthcare monitoring system using adaptive dilated transformer Bi‐LSTM with gated recurrent unit
Abstract

Innovative research works in the healthcare sector keep on advancing every day. As the “Internet of Things (IoT)” keeps on evolving, the application of IoT in the medical field is prominent these days. Utilizing IoT devices, alert messages can ...

A proper medical facility is not an affordable and easily available thing in many remote and rural regions in our country. In order to monitor the health condition of elderly people and people with chronic illnesses, a remote and automated system is ...

research-article
Performance analysis of FSO communications over a generalized turbulence fading channel with pointing error
Summary

Quantitatively assessing the performance of free space optical (FSO) communication systems requires an accurate description of turbulence induced fading. However, it is well known that common irradiance distributions inaccurately model intensity ...

The performance of optical wireless communication system under novel turbulence induced fading channel in the presence of pointing error is presented. System error rate performance, outage probability, and ergodic capacity are analyzed and asymptotic ...

research-article
SSE_CIB: Secure storage and exchange of copyrighted images using blockchain
Abstract

The rise of technology has resulted in the evolution of data generation at a rapid speed. With the high increase in the volume of data, it has become necessary to store it using reliable and scalable data management systems. Blockchain offers a ...

SSE_CIB is a blockchain‐based image sharing platform that ensures a secured and transparent way of exchanging images with customizable compression levels. IPFS‐upload activities are recorded in the blockchain with specific details that allow peers to ...

research-article
Development of hybrid heuristic‐assisted dynamic data auditing strategy in cloud sector
Abstract

Cloud computing is performed by hosting the data of data owners on cloud servers, where the data consumers (users) are able to get the data over servers. Though, several security aspects are raised during cloud storage regarding the data ...

The recommended data auditing framework in a network with RDC protocol includes four major elements as explained here. (1) TPA: It performs the auditing of the outsourced data and its validation. It generally guarantees that the data is remained intact ...

research-article
An artificial immune system‐based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs)
Abstract

The Mobile Ad Hoc Network (MANET) depending on dynamic distributed topology presents several challenges such as decentralized infrastructure. In MANET, each node act as a host as well as a router to exchange packet. From Source to destination, ...

This research introduces a security model based on the principles of an Artificial Immune System (AIS) to detect and defend against attacks from selfish nodes.The study utilizes AIS principles to categorize a node's behavioral state using the Mature ...

research-article
Blockchain‐based Human Intelligent Systems for Smart City Safety
Abstract

In the era of digitalization and smart city development, ensuring safety remains of utmost importance. As urban centers become more interconnected, the vulnerabilities present in their communication systems become increasingly apparent. In this ...

Our analysis explores the integration of NTRU and McEliece into Blockchain frameworks, focusing on their strengths and potential challenges. Additionally, it investigates how the convergence of Blockchain and Human‐Centric Intelligent Systems (HCIS) can ...

research-article
Open Access
LoRaSync: Energy efficient synchronization for scalable LoRaWAN
Abstract

Low‐power wide‐area networks connect a large number of battery‐powered wireless devices over long distances. Among them, long range wide area networks (LoRaWAN) implement a pure ALOHA medium access scheme to save device energy by minimizing the ...

LoRaSync is an energy‐efficient synchronization mechanism designed to support the implementation of slotted medium access control protocols for LoRa networks. Its robust design is based on real clock drift measurements, and a synchronization beacon ...

research-article
Opposition‐based improved memetic algorithm for placement of concurrent Internet of Things applications in fog computing
Abstract

The transpiration of a new computing standard, Fog computing exploits the computing resources immediacy to the Internet of Things (IoT) devices and hence together with the cloud servers bestow the required resources promptly. Even though the fog ...

The major contribution of this article is as follows:

  • A weighted cost model for the placement of IoT device applications with minimized energy consumption and execution time.

  • A lightweight prescheduling method to increase the number of concurrent ...

research-article
An efficient fine‐grained searchable encryption for secure communication in IoT‐based vehicular social networks
Abstract

Vehicle data security is a fundamental requirement in any vehicular social network (VSN). Encryption is the key technology to address this requirement. However, with encryption, we lose all the accessibility to the data. Further, we may need to ...

Efficient fine‐grained searching capabilities for VSN's are presented. Protection of sensitive data without compromising accessibilty is proposed. Study provides dymanic policy support in the absense of secret value redestribution. The proposed method ...

research-article
An ADO‐OFDM with integrated precoding, companding and optimized power allocation methods for high‐speed data transmission in visible light communication
Abstract

Visible light communications (VLC) has received a lot of attention in recent studies because of its benefits over radio‐frequency (RF) communications. It is a short‐range optical wireless communication system that uses light‐emitting diodes (...

In this study, ADO‐OFDM is developed by combining a generalized space–time line code (GSTLC) precoder with a Generalized Piecewise Linear Compander (GPLC), that is, GPSTLC‐ADO‐OFDM, to achieve high‐speed data transmission with reduced PAPR. GSTLC precoder ...

research-article
Improvement of MQTT semantic to minimize data flow in IoT platforms based on distributed brokers
Abstract

Message queuing telemetry transport (MQTT) is an application layer protocol that enables effective device communication in the Internet of Things (IoT). MQTT operates according to a publish‐subscribe model, where a broker receives messages from ...

This article's work focuses on the MQTT‐SD protocol. MQTT‐SD addresses the challenges posed by the significant volume of flow in the distributed mist‐based MQTT architecture. MQTT‐SD has a new mist‐based architecture that enables data fusion and ...

research-article
Deep‐Q‐Network hybridization with extended Kalman filter for accelerate learning in autonomous navigation with auxiliary security module
Abstract

This article proposes an algorithm for autonomous navigation of mobile robots that mixes reinforcement learning with extended Kalman filter (EKF) as a localization technique, namely EKF‐DQN, aiming to accelerate the maximization of the learning ...

This article proposes an algorithm for autonomous navigation of mobile robots that merges reinforcement learning with extended Kalman filter (EKF) as a localization technique, namely, EKF‐DQN, aiming to accelerate learning and improve the reward values ...

Comments