-
Article
A reliability aware protocol for cooperative communication in cognitive radio networks
One of the challenging tasks in cognitive radio (CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control (MAC) protocol for CR ne...
-
Chapter
Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study
Fog computing (FC) is a new model, which extends cloud computing services to the edge of computing networks. Different aspects of FC, such as security, have been extensively explored in the existing research. ...
-
Chapter
Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers
Nowadays, data centers and high-performance computing (HPC) systems are crucial for intensive computing environments. The energy efficiency in HPC is an evergreen problem. Moreover, energy-efficient design and...
-
Chapter
Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing
High-performance computing (HPC) demands many computers to perform multiple tasks concurrently and efficiently. For efficient resource utilization and for better response time, different scheduling algorithms ...
-
Chapter
Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions
In the last few decades, disasters made a huge loss to human beings, natural resources, and other assets. As we are living in an era of technology, there can be no other way better than using ICT (information ...
-
Article
ESOT: a new privacy model for preserving location privacy in Internet of Things
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communicat...
-
Article
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligator...
-
Article
Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks
-
Article
An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studie...