Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Flexible Global Aggregation And Dynamic Client Selection For Federated Learning In Internet Of Vehicles, Tariq Qayyum, Zouheir Trabelsi, Asadullah Tariq, Muhammad Ali, Kadhim Hayawi, Irfan Ud Din
Flexible Global Aggregation And Dynamic Client Selection For Federated Learning In Internet Of Vehicles, Tariq Qayyum, Zouheir Trabelsi, Asadullah Tariq, Muhammad Ali, Kadhim Hayawi, Irfan Ud Din
All Works
Federated Learning (FL) enables collaborative and privacy-preserving training of machine learning models within the Internet of Vehicles (IoV) realm. While FL effectively tackles privacy concerns, it also imposes significant resource requirements. In traditional FL, trained models are transmitted to a central server for global aggregation, typically in the cloud. This approach often leads to network congestion and bandwidth limitations when numerous devices communicate with the same server. The need for Flexible Global Aggregation and Dynamic Client Selection in FL for the IoV arises from the inherent characteristics of IoV environments. These include diverse and distributed data sources, varying data quality, …
Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal
Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal
All Works
This paper provides an overview of crowdsensing and some of its applications. Crowdsensing is a part of the collecting data situations also; it’s built on a data system on multiple customer interactions. Moreover, writing the general information of the smart cities can be used to boost to received number frequency to send messages. This work mentioned the Crowdsensing layers that describe Mobile crowdsensing. The article focuses on crowdsensing layers, developed an application in Coalition Game using crowdsensing in terms of GPS. In addition, this paper discussed the Mobile crowdsensing system and how important the cloud is in serving the wireless …
Trajectory Design For Uav-Based Data Collection Using Clustering Model In Smart Farming, Tariq Qayyum, Zouheir Trabelsi, Asad Malik, Kadhim Hayawi
Trajectory Design For Uav-Based Data Collection Using Clustering Model In Smart Farming, Tariq Qayyum, Zouheir Trabelsi, Asad Malik, Kadhim Hayawi
All Works
Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection in remote areas due to their remote mobility. The collected data require processing close to the end-user to support delay-sensitive applications. In this paper, we proposed a data collection scheme and scheduling framework for smart farms. We categorized the proposed model into two phases: data collection and data scheduling. In the data collection phase, the IoT sensors are deployed randomly to form a cluster based on their RSSI. The UAV calculates an optimum trajectory in order to gather data from all clusters. The UAV offloads the data to …
Secure And Authenticated Data Communication In Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe
Secure And Authenticated Data Communication In Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe
All Works
© 2015 by the authors; licensee MDPI, Basel, Switzerland. Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory …