Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Data And Resource Management In Wireless Networks Via Data Compression, Gps-Free Dissemination, And Learning, Xiaofei Cao
Data And Resource Management In Wireless Networks Via Data Compression, Gps-Free Dissemination, And Learning, Xiaofei Cao
Doctoral Dissertations
“This research proposes several innovative approaches to collect data efficiently from large scale WSNs. First, a Z-compression algorithm has been proposed which exploits the temporal locality of the multi-dimensional sensing data and adapts the Z-order encoding algorithm to map multi-dimensional data to a one-dimensional data stream. The extended version of Z-compression adapts itself to working in low power WSNs running under low power listening (LPL) mode, and comprehensively analyzes its performance compressing both real-world and synthetic datasets. Second, it proposed an efficient geospatial based data collection scheme for IoTs that reduces redundant rebroadcast of up to 95% by only collecting …
Secure Data Sharing In Cloud And Iot By Leveraging Attribute-Based Encryption And Blockchain, Md Azharul Islam
Secure Data Sharing In Cloud And Iot By Leveraging Attribute-Based Encryption And Blockchain, Md Azharul Islam
Doctoral Dissertations
“Data sharing is very important to enable different types of cloud and IoT-based services. For example, organizations migrate their data to the cloud and share it with employees and customers in order to enjoy better fault-tolerance, high-availability, and scalability offered by the cloud. Wearable devices such as smart watch share user’s activity, location, and health data (e.g., heart rate, ECG) with the service provider for smart analytic. However, data can be sensitive, and the cloud and IoT service providers cannot be fully trusted with maintaining the security, privacy, and confidentiality of the data. Hence, new schemes and protocols are required …