Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Efficient Data Compression With Error Bound Guarantee In Wireless Sensor Networks, Mohammad Abu Alsheikh, P. K. Poh, S. Lin, Hwee-Pink Tan, D. Niyato Sep 2014

Efficient Data Compression With Error Bound Guarantee In Wireless Sensor Networks, Mohammad Abu Alsheikh, P. K. Poh, S. Lin, Hwee-Pink Tan, D. Niyato

Research Collection School Of Computing and Information Systems

We present a data compression and dimensionality reduction scheme for data fusion and aggregation applications to prevent data congestion and reduce energy consumption at network connecting points such as cluster heads and gateways. Our in-network approach can be easily tuned to analyze the data temporal or spatial correlation using an unsupervised neural network scheme, namely the autoencoders. In particular, our algorithm extracts intrinsic data features from previously collected historical samples to transform the raw data into a low dimensional representation. Moreover, the proposed framework provides an error bound guarantee mechanism. We evaluate the proposed solution using real-world data sets and …


Integrating Self-Organizing Neural Network And Motivated Learning For Coordinated Multi-Agent Reinforcement Learning In Multi-Stage Stochastic Game, Teck-Hou Teng, Ah-Hwee Tan, Janusz A. Starzyk, Yuan-Sin Tan, Loo-Nin Teow Jul 2014

Integrating Self-Organizing Neural Network And Motivated Learning For Coordinated Multi-Agent Reinforcement Learning In Multi-Stage Stochastic Game, Teck-Hou Teng, Ah-Hwee Tan, Janusz A. Starzyk, Yuan-Sin Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Most non-trivial problems require the coordinated performance of multiple goal-oriented and time-critical tasks. Coordinating the performance of the tasks is required due to the dependencies among the tasks and the sharing of resources. In this work, an agent learns to perform a task using reinforcement learning with a self-organizing neural network as the function approximator. We propose a novel coordination strategy integrating Motivated Learning (ML) and a self-organizing neural network for multi-agent reinforcement learning (MARL). Specifically, we adapt the ML idea of using pain signal to overcome the resource competition issue. Dependency among the agents is resolved using domain knowledge …


Joint Virtual Machine And Bandwidth Allocation In Software Defined Network (Sdn) And Cloud Computing Environments, Jonathan David Chase, Rakpong Kaewpuang, Wen Yonggang, Dusit Niyato Jun 2014

Joint Virtual Machine And Bandwidth Allocation In Software Defined Network (Sdn) And Cloud Computing Environments, Jonathan David Chase, Rakpong Kaewpuang, Wen Yonggang, Dusit Niyato

Research Collection School Of Computing and Information Systems

Cloud computing provides users with great flexibility when provisioning resources, with cloud providers offering a choice of reservation and on-demand purchasing options. Reservation plans offer cheaper prices, but must be chosen in advance, and therefore must be appropriate to users' requirements. If demand is uncertain, the reservation plan may not be sufficient and on-demand resources have to be provisioned. Previous work focused on optimally placing virtual machines with cloud providers to minimize total cost. However, many applications require large amounts of network bandwidth. Therefore, considering only virtual machines offers an incomplete view of the system. Exploiting recent developments in software …


Optimal Performance Trade-Offs In Mac For Wireless Sensor Networks Powered By Heterogeneous Ambient Energy Harvesting, Jin Yunye, Hwee-Pink Tan Jun 2014

Optimal Performance Trade-Offs In Mac For Wireless Sensor Networks Powered By Heterogeneous Ambient Energy Harvesting, Jin Yunye, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In wireless sensor networks powered by ambient energy harvesting (WSNs-HEAP), sensor nodes' energy harvesting rates are spatially heterogeneous and temporally variant, which impose difficulties for medium access control (MAC). In this paper, we first derive the necessary conditions under which channel utilization and fairness are optimal in a WSN-HEAP, respectively. Based on the analysis, we propose an earliest deadline first (EDF) polling MAC protocol, which regulates transmission sequence of the sensor nodes based on the spatially heterogeneous energy harvesting rates. It also mitigates temporal variations in energy harvesting rates by a prediction and update mechanism. Simulation results verify the performance …


Ubiquitous Data-Centric Sensor Networks, Ting Yang, Peng Yung Woo, Zhaoxia Wang, Javid Taheri, Hoong Chor Chin, Guaqiang Hu Apr 2014

Ubiquitous Data-Centric Sensor Networks, Ting Yang, Peng Yung Woo, Zhaoxia Wang, Javid Taheri, Hoong Chor Chin, Guaqiang Hu

Research Collection School Of Computing and Information Systems

Ubiquitous data-centric sensor networks (U-DCSN) are a new integrated science and technology, which focus on data instead of individual sensor nodes. The network, as a dynamic database system, can accurately acquire data, perform high-performance processing of big data, and effectively access data from different users/actuators. Due this characteristic, U-DCSN hold huge potentials on service improvement in a wide range of applications and have attracted significant attention in recent years, for example, mobile cloud and consumer electronics. The modern mobile cloud, comprised of mobile devices (smart phones, tablets, and embedded sensor nodes), provides unlimited information resources, putting “cloud into a pocket.” …


A Robust Smart Card-Based Anonymous User Authentication Protocol For Wireless Communications, Fengton Wen, Willy Susilo, Guomin Yang Jan 2014

A Robust Smart Card-Based Anonymous User Authentication Protocol For Wireless Communications, Fengton Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart cardï based anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this paper, we reanalyze the security of Das' scheme, and show that the scheme is in fact insecure against impersonation attacks. We then propose a new smart cardï based anonymous user authentication protocol for wireless communications. Compared with the existing …