A survey of security in cloud, edge, and fog computing
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
[HTML][HTML] A survey on wearable technology: History, state-of-the-art and current challenges
Technology is continually undergoing a constituent development caused by the appearance
of billions new interconnected “things” and their entrenchment in our daily lives. One of the …
of billions new interconnected “things” and their entrenchment in our daily lives. One of the …
Managing perceived loneliness and social-isolation levels for older adults: a survey with focus on wearables-based solutions
As an inevitable process, the number of older adults is increasing in many countries
worldwide. Two of the main problems that society is being confronted with more and more, in …
worldwide. Two of the main problems that society is being confronted with more and more, in …
Applying machine learning to LTE traffic prediction: Comparison of bagging, random forest, and SVM
N Stepanov, D Alekseeva, A Ometov… - … Congress on Ultra …, 2020 - ieeexplore.ieee.org
Today, a significant share of smartphone applications use Artificial Intelligence (AI) elements
that, in turn, are based on Machine Learning (ML) principles. Particularly, ML is also applied …
that, in turn, are based on Machine Learning (ML) principles. Particularly, ML is also applied …
NB-IoT for D2D-enhanced content uploading with social trustworthiness in 5G systems
Future fifth-generation (5G) cellular systems are set to give a strong boost to the large-scale
deployment of Internet of things (IoT). In the view of a future converged 5G-IoT infrastructure …
deployment of Internet of things (IoT). In the view of a future converged 5G-IoT infrastructure …
Dynamic cloudlet-assisted energy-saving routing mechanism for mobile ad hoc networks
J Li, X Li, Y Gao, Y Gao, R Zhang - IEEE Access, 2017 - ieeexplore.ieee.org
In mobile ad hoc networks (MANETs), if mobile devices frequently leave or join the overlay
of MANETs, the communication links between mobile devices or between mobile devices …
of MANETs, the communication links between mobile devices or between mobile devices …
[HTML][HTML] Action-oriented programming model: Collective executions and interactions in the fog
Today's dominant design for the Internet of Things (IoT) is a Cloud-based system, where
devices transfer their data to a back-end and in return receive instructions on how to act …
devices transfer their data to a back-end and in return receive instructions on how to act …
Trust evaluation and covert communication-based secure content delivery for D2D networks: A hierarchical matching approach
X Shi, D Wu, C Wan, M Wang, Y Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secure content delivery issue for device-to-device networks
based on the trust evaluation mechanism and covert communication model. Specifically, in …
based on the trust evaluation mechanism and covert communication model. Specifically, in …
Subchannel Assignment for Social-Assisted UAV Cellular Networks using Dynamic Hypergraph Coloring
Abstract Device-to-Device (D2D) communication when used in conjugation with Unmanned
Aerial Vehicle (UAV) Femtocell and unlicensed spectrum can effectively tackle the ever …
Aerial Vehicle (UAV) Femtocell and unlicensed spectrum can effectively tackle the ever …
5G and D2D Communications at the Service of Smart Cities
More than half of the world population lives in cities, and the trend of moving to bigger cities
is increasing with the time (Chourabi et al., 2012). This increase in population of the cities is …
is increasing with the time (Chourabi et al., 2012). This increase in population of the cities is …