Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking
Computational Modeling & Simulation Engineering Faculty Publications
- Keyword
-
- Computer science (2)
- Engineering (2)
- Anomaly detection (1)
- Blockchain (1)
- Composability (1)
-
- Consortium (1)
- Data transmission (1)
- Decode-and-forward (1)
- Distributed (1)
- Dynamics (1)
- Ensembles (1)
- Full duplex relaying (1)
- Hoeffding trees (1)
- Industrial internet (1)
- Integratability (1)
- Internet of Intelligent Things (IoIT) (1)
- Internet of Things; LPWAN (1)
- Interoperability (1)
- IoT (1)
- Key management (1)
- LoRa (1)
- Machine learning (1)
- Optimal power allocation (1)
- Physical-layer security (1)
- Pragmatics (1)
- Protocol (1)
- Research issues (1)
- Residual self-interference (1)
- Scheme (1)
- Security and privacy (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Computational Modeling & Simulation Engineering Faculty Publications
Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
Computational Modeling & Simulation Engineering Faculty Publications
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Computational Modeling & Simulation Engineering Faculty Publications
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Computational Modeling & Simulation Engineering Faculty Publications
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions …
Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa
Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa
Computational Modeling & Simulation Engineering Faculty Publications
The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.