Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cloud computing (1)
- Collaborative filtering (1)
- Decode-and-forward (1)
- Full duplex relaying (1)
- Internet of medical things (IoMT) (1)
-
- Internet of things (Iot) (1)
- IoT malware (1)
- Malware detection (1)
- Optimal power allocation (1)
- Optimal routing tree algorithm (1)
- Physical-layer security (1)
- Quality of service (QoS) (1)
- Recommender systems (1)
- Residual self-interference (1)
- Security (1)
- Smart communications (1)
- Wireless sensor networks (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu
Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu
Electrical & Computer Engineering Faculty Publications
(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Computational Modeling & Simulation Engineering Faculty Publications
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …