Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Zayed University

Sensors

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Flexible Global Aggregation And Dynamic Client Selection For Federated Learning In Internet Of Vehicles, Tariq Qayyum, Zouheir Trabelsi, Asadullah Tariq, Muhammad Ali, Kadhim Hayawi, Irfan Ud Din Jan 2023

Flexible Global Aggregation And Dynamic Client Selection For Federated Learning In Internet Of Vehicles, Tariq Qayyum, Zouheir Trabelsi, Asadullah Tariq, Muhammad Ali, Kadhim Hayawi, Irfan Ud Din

All Works

Federated Learning (FL) enables collaborative and privacy-preserving training of machine learning models within the Internet of Vehicles (IoV) realm. While FL effectively tackles privacy concerns, it also imposes significant resource requirements. In traditional FL, trained models are transmitted to a central server for global aggregation, typically in the cloud. This approach often leads to network congestion and bandwidth limitations when numerous devices communicate with the same server. The need for Flexible Global Aggregation and Dynamic Client Selection in FL for the IoV arises from the inherent characteristics of IoV environments. These include diverse and distributed data sources, varying data quality, …


Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal Jan 2022

Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal

All Works

This paper provides an overview of crowdsensing and some of its applications. Crowdsensing is a part of the collecting data situations also; it’s built on a data system on multiple customer interactions. Moreover, writing the general information of the smart cities can be used to boost to received number frequency to send messages. This work mentioned the Crowdsensing layers that describe Mobile crowdsensing. The article focuses on crowdsensing layers, developed an application in Coalition Game using crowdsensing in terms of GPS. In addition, this paper discussed the Mobile crowdsensing system and how important the cloud is in serving the wireless …


Trajectory Design For Uav-Based Data Collection Using Clustering Model In Smart Farming, Tariq Qayyum, Zouheir Trabelsi, Asad Malik, Kadhim Hayawi Jan 2022

Trajectory Design For Uav-Based Data Collection Using Clustering Model In Smart Farming, Tariq Qayyum, Zouheir Trabelsi, Asad Malik, Kadhim Hayawi

All Works

Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection in remote areas due to their remote mobility. The collected data require processing close to the end-user to support delay-sensitive applications. In this paper, we proposed a data collection scheme and scheduling framework for smart farms. We categorized the proposed model into two phases: data collection and data scheduling. In the data collection phase, the IoT sensors are deployed randomly to form a cluster based on their RSSI. The UAV calculates an optimum trajectory in order to gather data from all clusters. The UAV offloads the data to …


Secure And Authenticated Data Communication In Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe Aug 2015

Secure And Authenticated Data Communication In Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe

All Works

© 2015 by the authors; licensee MDPI, Basel, Switzerland. Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory …