Search
Search Results
-
Data Security Complications on Computing Technology in Mobile Cloud
Mobile devices resource limitations are a direct result of mobile computing rapid development. Nowadays, the gadget that was primarily used to... -
Back to Wireless Basics
In this chapter, we go back to wireless basics and discuss the challenges and limitations that are inherent in wireless communications as compared to... -
Optimal multiuser uplink data detection for 5G communication networks
The complex channel fading statistics and large antenna array employed in massive multiple input and multiple outputs (MIMO) for uplink and downlink...
-
Stacked denoising autoencoder for missing traffic data reconstruction via mobile edge computing
Traffic sensing system requires to periodically collect spatial–temporal traffic data distributed among road networks, which results in overhigh...
-
A Hybrid Optimization Driven Deep Residual Network for Sybil Attack Detection and Avoidance in Wireless Sensor Networks
Small Sensor nodes that can sense, store, and send data make up a wireless sensor network (WSN). In addition, the sensor nodes are limited when it... -
Energy aware African buffalo-based optimized dynamic media access control protocol for mobile Adhoc network environment
The Media Access Control (MAC) protocol has been adopted and functioned in many network applications to share data between network users. However,...
-
Anonymity and security improvements in heterogeneous connected vehicle networks
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and...
-
Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey
The research in Underwater Wireless Sensor Networks (UWSNs) has gained momentum over the last two decades owing to the vast applications it supports...
-
Clustering with a high-performance secure routing protocol for mobile ad hoc networks
Mobile ad hoc networks (MANETs) comprise a collection of independent, compact-sized, and inexpensive sensor nodes, which are commonly used to sense...
-
Mobility-aware computational offloading in mobile edge networks: a survey
Technological evolution of mobile devices, such as smart phones, laptops, wearable and other handheld devices have come up with the emergence of...
-
Performance evaluation and downstream system planning based energy management in LTE systems
The Mobile Edge Computing is a novel prototype that was developed recently due to the benefits and expanding nature of electronic data-processing...
-
An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels
In mobile wireless broadcast networks, XML data is encrypted before it is sent over the broadcast channel in order to ensure the confidentiality of...
-
Review on mobility aware MAC protocol using Mobile internet of things
Modern boom and understanding of our growing needs, applications based on the Mobile Internet of Things (MIoT) are becoming important for future...
-
Opportunistic Networks: An Empirical Research of Routing Protocols and Mobility Models
Opportunistic networks (OppNets) are a sub-part of (delay-tolerant networks) DTNs but are quite different from it. OppNets do not need any end-to-end...
-
Cellular Goore Game and its application to quality-of-service control in wireless sensor networks
The Goore Game (GG) is a model for collective decision-making under uncertainty, which can be used as a tool for stochastic optimization of a...
-
RF and Wireless Technologies
We began Chapter 6 by discussing the differences between Analog and Digital signals and the various... -
A Service-Oriented Middleware Enabling Decentralised Deployment in Mobile Multihop Networks
The number of computing devices, mostly smartphones is tremendous. The potential for distributed computing on them is no less huge. But develo**... -
A priority aware local mutual exclusion algorithm for flying ad hoc networks
In Flying Ad Hoc Networks (FANETs), the critical resource resides in an Unmanned Aerial Vehicle (UAV) and the user nodes within the UAV’s...
-
A Distributed Cross-Layer Protocol for Sleep Scheduling and Data Aggregation in Wireless Sensor Networks
We propose a Cross-layer Protocol for Sleep scheduling and Data aggregation (CPSD) in Wireless Sensor Networks (WSNs) to improve the performance in... -
Mobile crowdsensing with energy efficiency to control road congestion in internet cloud of vehicles: a review
Traveling demand increased rapidly on the roads of big cities. Traffic congestion is observed on a regular basis and causes serious problems for...