-
Article
A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions
Provisioning security to the communications, data, and partaking things in resource-constrained IoT is a huge challenge. Due to the scalability and interoperability among low power-consuming networks, 6LoWPAN is ...
-
Article
6GIoDT: 6G-assisted intelligent resource utilization framework for the Internet of Drone Things
Beyond 5th generation (B5G) mobile communication framework is a paramount research domain in modern networking and message transfer. In 6G communication, the prime objective is ultralow latency communication, ...
-
Article
Jurisprudence: blockchain enabled privacy preserving framework complying digital ethics
Sustainable professional integrity is the pivoting factor for maintaining the expected ethical standard of a profession. Whereas privacy of a user becomes vulnerable due to the digital transactions performed o...
-
Article
MediChain: Medical data fusion using blockchain integrated elastic storage
The Internet of Medical Things (IoMT) consists of interconnected bio-sensor-based health devices. Large numbers of medical devices are supposed to generate a high amount of real-time health data. Therefore, se...
-
Article
Sustainable Spectrum Allocation Strategy for 5G Mobile Network
These days, 5G wireless communication are being created for different modern IoT (Internet of Things) applications around the world, arising with the IoT. All things considered, it is feasible to send energy e...
-
Article
SigSense: Mobile Crowdsensing Based Incentive Aware Geospatial Signal Monitoring for Base Station Installation Recommendation Using Mixed Reality Game
SigSense, a mobile crowdsensing-based geospatial video game, has been proposed to survey live signal strength using smartphones.It provides attractive incentives to the contributers. Live data collected as a s...
-
Article
Femtolet Based Low Power Hetnet Using Soft Fractional Frequency Reuse
This paper addresses three prime issues of fifth generation mobile network: frequency allocation, power efficiency and communication while computing. This paper proposes a power-efficient micro-femtolet/macro-...
-
Article
SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA
Security in quantum dot cellular automata (SQCA) is an emerging trend in the arena of nanotechnology. Its features are high computing speed, smaller size and low power depletion in comparison to transistor ori...
-
Article
Design of thermometer code-to-gray code converter circuit in quantum-dot cellular automata for nano-computing network
This article proposes the thermometer code converter, which eliminates the requirement of binary code converter to generate gray codes in different digital modulation techniques like pulse code modulation. The...
-
Article
mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing
Filtering spam voice calls are a still major challenge in today’s technology contrary to SMS or email-based spamming. A numerical measure of the trust between users can help us filter calls based on relevance....
-
Chapter
Study of Power Efficient 5G Mobile Edge Computing
Recently, there has been a lot of innovative work on cloud-based mobile networks. While distributed computing gives immense chances, it likewise forces a few difficulties. One of the difficulties that current ...
-
Chapter
Mobile Edge Computing Based Internet of Agricultural Things: A Systematic Review and Future Directions
In the modern era of Information Technology, a combined solution framework integrating Wireless Sensor Network (WSN), Internet of Things (IoT), cloud and edge computing, data analytics, and other related techn...
-
Article
Tea leaf disease detection using multi-objective image segmentation
Tea leaves’ diseases caused by constant exposure to pathogens lead to significant crop yield loss globally. Diagnosing the tea leave disease at an early stage minimizes the tea yield loss. In this study, a nov...
-
Article
Distributed bandwidth selection approach for cooperative peer to peer multi-cloud platform
Network function virtualization (NFV) is a well-accepted software-defined network (SDN) architecture concept. NFV is severally used in cloud platform to enhance the utilization of available network resources. ...
-
Chapter
Deep Learning in Computer Vision Through Mobile Edge Computing for IoT
The success of Artificial Intelligence (AI) through Deep Learning (DL) and Computer Vision has inspired many researchers to work on many real-life and human-centered tasks. These current AI systems are in use ...
-
Chapter
Introduction to Mobile Edge Computing
Fifth generation mobile networks aim to use multi-tier heterogeneous cellular networks integrated with cloud computing to provide users with low latency and energy-aware service. However, for high bandwidth an...
-
Chapter
SMEC: Sensor Mobile Edge Computing
The development of mobile user equipment progresses cooperatively with the advancement of the latest mobile applications. Still, the limited battery capacity prevents users from running computationally intensi...
-
Article
EEFFL: energy efficient data forwarding for forest fire detection using localization technique in wireless sensor network
Early prediction of a forest fire is one of the critical research challenges of the wireless sensor network (WSN) to save our ecosystem. In WSN based forest fire detection system, sensor nodes are deployed in ...
-
Article
iMusic: a session-sensitive clustered classical music recommender system using contextual representation learning
Music has emerged to be of paramount importance to humanity and is not only considered as a source of entertainment but also an agent that causes social and psychological influences. A large number of existing...
-
Article
Power and Delay Efficient Multilevel Offloading Strategies for Mobile Cloud Computing
Mobile cloud computing has introduced offloading to save the battery life of mobile devices. In mobile cloud computing optimization of power and delay for offloading has become a vital research scope. However,...